A Review On Energy Efficient Secure Routing For Data Aggregation In Wireless Sensor Networks

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2013 by IJETT Journal
Volume-4 Issue-10
Year of Publication : 2013
Authors : K.Sasikala , M.Geetha


K.Sasikala , M.Geetha. "A Review On Energy Efficient Secure Routing For Data Aggregation In Wireless Sensor Networks". International Journal of Engineering Trends and Technology (IJETT). V4(10):4579-4583 Oct 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.


Wireless sensor nodes challenges are supply maximum lifetime and provide secure communication to network. It has small in size and limited processing capability with very low battery power. This restriction of low battery power makes the sensor network prone to failure. So it conserves battery power or energy with some security considerations. The energy is mainly consumed for three purposes: data transmission, signals and hardware usage. Most of energy consumption happens because of data transmission. The data transmission can be optimized by using efficient secure routing and effective ways of data aggregation. Data aggregation technique maximize the lifetime of wireless sensor network by decreasing the number of packets to be sent to sink or base station. Cluster-heads implement data aggregation for distinct data in encrypted form is transmitted from sensor nodes to the base station via cluster-heads. Cluster heads no need of information about sensor data.


[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks:A survey. Computer Networks, March 2002.
[2] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., Cayirci, E. (2002) ‘A Survey on Sensor Networks’, IEEE Communications Magazine, 40(8), 102-114.
[3] Fasolo E., Rossi M., Widmer J. and Zorzi M. (2007) IEEE Wireless communication. [4] C. Shen, C. Srisathapornphat, and C. Jaikaeo, “Sensor information networking architecture and applications,” IEEE Personnel Communications, Aug. 2001, pp.52-59.
[5] S. Tilak, N. Abhu-Gazhaleh, W. R. Heinzelman, “A taxanomy of wireless micro-sensor network models,” ACM SIGMOBILE Mobile Comp. Commun. Rev., vol. 6, no. 2, Apr. 2002, pp. 28- 36.
[6] Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas, “Routing Protocol in Wireless Sensor Networks”, Sensors 2009, vol. 9, pp. 8399 -8421.
[7] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proceedings ACM MobiCom`00, Boston, MA, Aug. 2000, pp. 56-67.
[8] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks", Wireless Networks, vol. 8, no.5, Sept. 2002, pp. 481-494.
[9] Braginsky D., Estrin D. (2002) Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA.
[10] Schurgers C. and Srivastava M.B. (2001) Energy Efficient Routing in Wireless Sensor Networks. In MILCOM Proceedings on Communications for Network-Centric Operations: Creating the Information Force, McLean, VA.
[11] D. B Johnson et al., “Dynamic Source Routing in Ad Hoc Wireless Networks”, in Mobile Computing, edited by Tomas Imielinski and Hank Korth, Kluwer Academic Publishers, ISBN: 0792396979, 1996, Chapter 5, pp. 153-181.
[12] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (2000) Energy-Efficient Communication Protocol forWireless Microsensor Networks” Proceedings of the 33rd Hawaii International Conference on System
[13] Perrig A., Szewczyk R., Wen V., Cullar D., and Tygar J. D. (2001) Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, 189- 199.
[14] Hu L. and Evans D. (2003) Workshop on Security and Assurance in Ad hoc Networks.
[15] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: Security protocols for sensor network, Wireless Networks 8 (5) (2002) pp. 521–534.
[16] B. Schneier, Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer, Berlin, 1994. pp. 191–204.

Sensor network; secure routing, Data aggregation; Cluster;