A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low ommunication overhead and be fitted with various aggregation functions (like sum, average, max, min etc.). To achieve these security needs, it uses symmetric encryption and message authentication code (MAC). Encryption ensures data onfidentiality while message authentication code ensures authentication and data integrity. An anomaly detection algorithm is used to detect the anomaly or outliers and thus prevent the deceitful- corrupted data from being contributed to the final aggregated results. Simulation results show that our protocol enhances the security of the aggregated data considerably in WSNs.
Authors and Affiliations
Mukesh Kumar Jha , T. P. Sharma
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
The problem of the knowledge acquisition and efficient knowledge exploitation is very popular also in agriculture area. One of the methods for knowledge acquisition from the existing agricultural databases is the methods...
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...
SQL Injection in Oracle An exploration of vulnerabilities
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection ca...
Using Association Rule Mining for Extracting Product Sales Patterns in Retail Store Transactions
Computers and software play an integral part in the working of businesses and organisations. An immense amount of data is generated with the use of software. These large datasets need to be analysed for useful informatio...
Ambient Intelligence: The Next Generation Technology
Configuration of the computing and communications systems found at home and in the workplace is a complex system design that currently requires the attention of the user. Recently, researchers have begun to explore compu...