Work place: Department of Electronics and Communication Engineering, S G Balekundri Institute of Technology, Belagavi, India
E-mail: veenaip043@gmail.com
Website:
Research Interests: Computer Networks, Network Architecture, Network Security
Biography
Ms. Veena I Puranikmath received the Bachelor degree in Electronics and Communication Engineering at S. G. Balekundri Institute of Technology, Belagavi and her masters in the stream of Digital Communication and Networking at Godutai Engineering College for Women, Gulbarga. She is currently working as Assistant Professor in the department of Electronics & Communication Engineering at S. G. Balekundri Institute of Technology, Belagavi. She is pursuing her Ph.D at Visvesvaraya Technological University, Belagavi. Her area of research interests includes Wireless Sensor Networks and Communication Systems.
By Veena I Puranikmath Sunil S Harakannanavar Satyendra Kumar Dattaprasad Torse
DOI: https://doi.org/10.5815/ijcnis.2019.03.05, Pub. Date: 8 Mar. 2019
The use of wireless sensor networks has been increasing tremendously in the past decades mainly because of its applications in military, medicine, under water survey and various other fields. Depending on the applications the sensor nodes are placed in different areas and the data sensed will be sent to the base station. The process of transmitting and receiving data sensed by the sensor nodes continues till the sensors have battery life. This leads to generate data redundancy and reduces efficiency of the network. In order to overcome the limitations faced by the wireless sensor networks, the fusion of data known as data aggregation is introduced. In data aggregation, the data sensed by the various nodes are aggregated and sent to the base station as a single data packet. In this paper, a brief review on various data aggregation methods, challenges and issues are addressed. In addition to this, performance parameters of various data fusion methods to measure the efficiency of the network are discussed. The design of single aggregator models are easy compared to the multiple aggregator models. However, the security to most of the data fusion schemes is provided by using message authentication code. It also uses public keys and symmetric to achieve end to end or hop by hop encryptions.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals