Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
A Wireless Sensor Network can be defined as a group of sensors which are distributed spatially to monitor physical or spatial conditions such as temperature, volcano, fire monitoring, sound, urban sensing, pressure etc. In a large WSN, the data aggregation significantly reduces communication overhead and energy consumption. In order to pass data, although data in-network aggregation was used and it reduced the problem of communication overhead and transmission loss but failed in computing double-counting sensitive aggregates at the Base Station. The research community proposed synopsis diffusion to eliminate this problem but it did not helped in securing the network against the problem of attacks caused by the compromised nodes, resulting in the false computation of aggregate. In this paper, synopsis diffusion is being made secure against the attacks by compromised nodes. To do so, an algorithm is being presented which can securely compute aggregates in the presence of such attacks. This algorithm is named as Attack-Resilient algorithm. The attack-resilient algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy.Extensive studies and performance analysis have shown that the proposed algorithm i.e. Attack-Resilient algorithm is more effective and outperforms other existing approaches.
Keywords: Data aggregation, hierarchical aggregation, in-network aggregation, sensor network security, synopsis diffusion, attack resilient
Edition: Volume 4 Issue 11, November 2015
Pages: 1287 - 1291
How to Cite this Article?
Devendra Hapase, S. D. Satav, "Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151404, Volume 4 Issue 11, November 2015, 1287 - 1291
101 PDF Views | 79 PDF Downloads
Similar Articles with Keyword 'Data aggregation'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1147 - 1150Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation
Harshada Kupade, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3273 - 3277Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing
Farhat Afshan, Shameem Akther
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 2017 - 2020Survey on Secured Multi Sink Data Aggregation Scheme in Mobile Sensing
Tejashree Borbande, Vikas Maral
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1345 - 1348A Survey on Security Frameworks for Cluster Based Wireless Sensor Networks
Shital Mane, Madhav Ingle
Similar Articles with Keyword 'hierarchical aggregation'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1028 - 1030Straining Attacker?s Impact in WSN using Secure Data Aggregation
Akshaya Shah, Dr. K. N. Honwadkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 437 - 439A Survey: Secure Data Aggregation in Wireless Sensor Networks
Priyanka Kamthe, Sanjeev J. Wagh
Similar Articles with Keyword 'in-network aggregation'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 320 - 323A Trivial And Consistent Routing With In-Network Aggregation In Wireless Sensor Networks
C.Pravallika, T.Venkata Naga Jayudu
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3036 - 3040Dependable Routing Approach for In-Network Aggregation in Wireless Sensor Network
Soniya B. Patil, Dr. Aarti Dixit
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3253 - 3257BIST Based Secure Data Aggregation in Wireless Sensor Network
Rakesh Kumar Ranjan, S. P. Karmore
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013
Pages: 285 - 288An Efficient Routing Approach for In-Network Aggregation in Wireless Sensor Networks
D. N. Rewadkar, Priti Madhukar Mithari
Similar Articles with Keyword 'sensor network security'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1882 - 1884Catching Moles and Packet Droppers in Wireless Sensors Network
Mohammed Hajee, Mohammed Abdul Rawoof
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1231 - 1234Protocols Security for Wireless Sensor Networks
Parli B. Hari, Monika
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013
Pages: 105 - 108A Security Enhancing Scheme in Leach using Homomorphic Encryption
Neha Chhabra, Parikshit Singla
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1028 - 1030Straining Attacker?s Impact in WSN using Secure Data Aggregation
Akshaya Shah, Dr. K. N. Honwadkar
Similar Articles with Keyword 'synopsis diffusion'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1028 - 1030Straining Attacker?s Impact in WSN using Secure Data Aggregation
Akshaya Shah, Dr. K. N. Honwadkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 437 - 439A Survey: Secure Data Aggregation in Wireless Sensor Networks
Priyanka Kamthe, Sanjeev J. Wagh
Similar Articles with Keyword 'attack resilient'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1287 - 1291Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation
Devendra Hapase, S. D. Satav
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2011 - 2014Attack Detection and Mitigation for AGC
Pooja A Kulkarni, Harshal A Karande
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1028 - 1030Straining Attacker?s Impact in WSN using Secure Data Aggregation
Akshaya Shah, Dr. K. N. Honwadkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 437 - 439A Survey: Secure Data Aggregation in Wireless Sensor Networks
Priyanka Kamthe, Sanjeev J. Wagh