Version 1
: Received: 25 July 2016 / Approved: 25 July 2016 / Online: 25 July 2016 (14:38:07 CEST)
How to cite:
Emmanuel, N.; Anjum, A.; Shafiq, S.; Adam, M. H. Current State of Art in Security of Data Aggregator in Smart Grids. Preprints2016, 2016070077. https://doi.org/10.20944/preprints201607.0077.v1
Emmanuel, N.; Anjum, A.; Shafiq, S.; Adam, M. H. Current State of Art in Security of Data Aggregator in Smart Grids. Preprints 2016, 2016070077. https://doi.org/10.20944/preprints201607.0077.v1
Emmanuel, N.; Anjum, A.; Shafiq, S.; Adam, M. H. Current State of Art in Security of Data Aggregator in Smart Grids. Preprints2016, 2016070077. https://doi.org/10.20944/preprints201607.0077.v1
APA Style
Emmanuel, N., Anjum, A., Shafiq, S., & Adam, M. H. (2016). Current State of Art in Security of Data Aggregator in Smart Grids. Preprints. https://doi.org/10.20944/preprints201607.0077.v1
Chicago/Turabian Style
Emmanuel, N., Sadia Shafiq and Mahamud Hussein Adam. 2016 "Current State of Art in Security of Data Aggregator in Smart Grids" Preprints. https://doi.org/10.20944/preprints201607.0077.v1
Abstract
Multiple sensor nodes known as detection stations make the sensor networks; each node is light and portable. Every sensor node contains power source, microcomputer, transducer and transceiver. Power source provides power to each node. Micro-computer is used for storing and processing the output coming from the sensors. The transducer is used to generate the signals and the transceiver is used to receive and transmit data to the central computer. Eavesdropping gets facilitated with wireless communication, and it has many useful applications in military, homeland, hostile and uncontrolled environments. So it is prone to the high level of security. The process in which information is gathered to form a summarized type for analysis is known as data aggregation, as it is used to reduce the energy consumption in wireless sensor networks. The security issues have become crucial in data aggregation, especially when gets deployed in hostile and remote environment. In wireless sensor networks many secure aggregations have been proposed. It still faces some resource constrained that’s why new techniques are needed. In our survey we will discuss those approaches and their pros and cons.
Keywords
Data aggregation, Security and Wireless Sensor Network
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.