Overview of CDAMA Scheme in Wireless Sensor Network Using DAS Model

Data aggregation in Wireless Sensor Network refers to acquiring the sensed data from the sensors to the gateway node. Data aggregation scheme minimize a large amount of transmission data to the base station, so that improve the energy efficiency and prolong the wireless network lifetime. CDAMA is designed by using multiple points, each of which has different order. It is designed for a multi-application environment. It mitigates the impact of compromising attacks in single application environments and degrades the damage from unauthorized aggregations. In the database-service-provider model, user's data resides on the premises of the provider. Both corporations and individuals view their data as a very valuable asset. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data.

[1]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[2]  Hasan Çam,et al.  Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..

[3]  D. Bhattacharya Secure Data Aggregation in Wireless Sensor Networks , 2014 .

[4]  E. Mykletun,et al.  Incorporating a secure coprocessor in the database-as-a-service model , 2005, Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA'05).

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[7]  Hung-Min Sun,et al.  CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.

[8]  Dirk Westhoff,et al.  A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.

[9]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[10]  M. Satyanarayanan,et al.  Mobile computing , 1993, Computer.

[11]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[12]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[13]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[14]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[15]  Hakan Hacigümüs,et al.  Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.