Straining Attacker's Impact in WSN using Secure Data Aggregation
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)Publication Date: 2015-01-05
Authors : Akshaya Shah; K. N. Honwadkar;
Page : 1028-1030
Keywords : Data aggregation; hierarchical aggregation; in-network aggregation; sensor network security; synopsis diffusion; attack resilient;
Abstract
Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy.
Other Latest Articles
- A Typical Discoid Lupus Erythromatosus: A Case Report and a Brief Review of the Literature
- QoS Routing Protocols in MANETs - A Review
- The Impact of Particles Size Variation of Waste Materials of Heavy Concrete for Gamma Ray Absorption
- A Survey of Rank Based Search Results over Encrypted Cloud Data
- Semi-Automatic Ontology Merging of Domain Specific Ontologies
Last modified: 2021-06-30 21:20:16