Joyce Jose

Work place: Dept. Information Technology, Karunya University, Coimbatore, India

E-mail: joycejose1990@gmail.com

Website:

Research Interests: Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Data Structures and Algorithms

Biography

Joyce Jose received the B Tech degree in Computer Science & Engineering from Mahatma Gandhi University in the year 2011, Currently she is a Post Graduate Scholar in Network and Internet Engineering at Karunya University. She has published a paper titled ―A survey on Secure Data Aggregation Protocols in Wireless Sensor Networks‖ in International Journal of Computer Applications (0975 – 8887) Volume 55– No.18, October 2012. Her research interest in the area of data aggregation in Wireless Sensor Networks.

Author Articles
Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey

By Josna Jose Joyce Jose

DOI: https://doi.org/10.5815/ijitcs.2014.05.04, Pub. Date: 8 Apr. 2014

The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained WSNs. Concealed Data Aggregation (CDA) based on privacy homomorphism (PH) gives a critical solution for energy efficient secure data aggregation in WSNs. PH based algorithms allow aggregation to be happened on cipher texts. Thus, it eliminates the power consuming decryption operations at the aggregator node for the data aggregation and further encryption for the secure transmission of aggregated data. It also avoids the aggregator node from the burden of keeping the secret key information and thereby it achieves energy efficiency and reduces the frequency of node compromise attacks in aggregator nodes. Among the CDA techniques, asymmetric PH based CDA techniques are exploring due to their combination with elliptic curve cryptography having reduced key size. We present an overview of asymmetric concealed data aggregation techniques that achieve both end to end data confidentiality and non delayed data aggregation.

[...] Read more.
Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

By Joyce Jose M. Princy Josna Jose

DOI: https://doi.org/10.5815/ijcnis.2013.07.08, Pub. Date: 8 Jun. 2013

The data aggregation is a widely used energy-efficient mechanism in wireless sensor Networks (WSNs), by avoiding the redundant data transmitting to base station. The deployment of wireless communicating sensor nodes in the hostile or unattended environment causes attack more easily and the resource limited characteristics make the conventional security algorithms infeasible, hence protecting privacy and integrity during data aggregation is a challenging task. The privacy of a sensor data ensures, it is known only to itself and the integrity guarantees sensor data has not tampered during data aggregation. The Integrity Protecting Privacy preserving Data Aggregation (IPPDA) protocols ensures a robust and accurate results at the base station. This paper summarises on such IPPDA protocols during data aggregation.

[...] Read more.
Other Articles