Perspective Study on Recoverable Concealed Data Aggregation in WSNs
John Major. J1, Shajin Prince2

1Mr. J. John Major, Electronics and Communication Engineering, Karunya University, Coimbatore, India.
2Prof. Shajin Prince, Electronics and Communication Engineering, Karunya University, Coimbatore, India.
Manuscript received on February 09, 2013. | Revised Manuscript received on February 12, 2013. | Manuscript published on February 15, 2013. | PP: 9-13 | Volume-1 Issue-3, February 2013. | Retrieval Number: C0138020213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In Wireless Sensor Networks, Traditional Aggregation Schemes were used to aggregate the ciphertext without decryption. Since it causes problems such as aggregation constraint and failure of data integrity, a new technique called Recoverable Concealed Data Aggregation was introduced. Here in this scheme, the base station can recover all the sensing data even these data has been aggregated. Such a property is called as ‘recoverable’. Also it suits well for both homogeneous and heterogeneous wireless sensor networks. In this paper, a comprehensive overview of all the supportive aggregation mechanisms was discussed briefly.
Keywords: Data aggregation, wireless sensor networks, privacy homomorphism encryption.