International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 291

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.4 / 10


     

BIST Based Secure Data Aggregation in Wireless Sensor Network

Rakesh Kumar Ranjan, S. P. Karmore


Abstract: Number of applications, like border surveillance, under water sensor networks widely use the Wireless Sensor Network. When in network data aggregation is performed there is significant reduction in the amount of communication overhead and energy consumption in a large WSN. Various types available for data aggregation techniques are centralised approach, In-network aggregation, tree-based approach, Cluster-based approach, Different protocol which performs secured data aggregation considered are Secure Data Aggregation Protocol (SDAP), Secure information aggregation (SIA), Threshold security for Information aggregation in Sensor networks (THIS), Privacy-preserving Data Aggregation (PDA), Secure Encrypted-data Aggregation (SEA), Data aggregation and authentication protocol (DAA). However in all these approaches the protocol do not allow intermediate nodes to perform data aggregation thus limits the benefit of data aggregation. In this paper the new approach i. e. BIST+RC6+Aggregation is considered which will perform secured data aggregation


Keywords: Data aggregation, Data security, Wireless sensor network WSN, BIST


Edition: Volume 4 Issue 4, April 2015


Pages: 3253 - 3257



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rakesh Kumar Ranjan, S. P. Karmore, "BIST Based Secure Data Aggregation in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 3253-3257, https://www.ijsr.net/getabstract.php?paperid=SUB153942, DOI: https://www.doi.org/10.21275/SUB153942



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 625 - 633

Ridesharing DApps - A Study on Peer-to-Peer Ridesharing on Ethereum

Tushar S Menon, Aviral Srivastava, Aditya, Dr. Radhika K R

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 844 - 850

Data-Driven Decision Making: Advanced Database Systems for Business Intelligence

Maria Anurag Reddy Basani, Anudeep Kandi

Share this Article



Top