To read the full version of this content please select one of the options below:

Secured data aggregation in wireless sensor networks

Sathya D. (Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, India)
Ganesh Kumar P. (Department of Information Technology, Anna University, Regional Campus, Coimbatore, India)

Sensor Review

ISSN: 0260-2288

Article publication date: 19 February 2018

Issue publication date: 24 May 2018




This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.


Nowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Boneh et al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.


The combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.

Practical implications

The secured data aggregation is useful in health-related applications, military applications, etc.


The new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.



D., S. and P., G.K. (2018), "Secured data aggregation in wireless sensor networks", Sensor Review, Vol. 38 No. 3, pp. 369-375.



Emerald Publishing Limited

Copyright © 2018, Emerald Publishing Limited

Related articles