Straining Attacker's Impact in WSN using Secure Data Aggregation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 319

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10


     

Straining Attacker's Impact in WSN using Secure Data Aggregation

Akshaya Shah, Dr. K. N. Honwadkar


Abstract: Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy.


Keywords: Data aggregation, hierarchical aggregation, in-network aggregation, sensor network security, synopsis diffusion, attack resilient


Edition: Volume 4 Issue 1, January 2015


Pages: 1028 - 1030



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Akshaya Shah, Dr. K. N. Honwadkar, "Straining Attacker's Impact in WSN using Secure Data Aggregation", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1028-1030, https://www.ijsr.net/getabstract.php?paperid=SUB15274, DOI: https://www.doi.org/10.21275/SUB15274

Top