Table of Content

Open AccessOpen Access


Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Micro-system and Information Technology, Chinese Academy of Sciences, Shanghai, 201899, China.
Shanghai Research Center for Wireless Communication, Shanghai, 201210, China.
College of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, 810007, China.
School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, 221116, China.
Infromation Communication Technology Department, Wollo University, Dessie Ethiopia, Ethiopia.

*Corresponding Author: Wuxiong Zhang. Email: .

Computers, Materials & Continua 2019, 61(2), 583-599.


As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN.


Cite This Article

W. Fang, W. Zhang, Q. Zhao, X. Ji, W. Chen et al., "Comprehensive analysis of secure data aggregation scheme for industrial wireless sensor network," Computers, Materials & Continua, vol. 61, no.2, pp. 583–599, 2019.


This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1907


  • 1006


  • 0


Share Link