A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far the most energy consuming task and by reducing its contribution a great amount of energy can be saved. Data aggregation can extend network lifetime and reduce its traffic. However, providing security requirements such as, end-to-end confidentiality or aggregate integrity while performing data aggregation is a challenging task. Here, we propose a scalable method for aggregating encrypted data. The integrity of aggregated data from outsider attacks is checked through a distributed method. Compared to the previous method, our scheme achieves better performance in presence of silent nodes and avoids blind rejection in presence of outsider attacks.
Authors and Affiliations
Mitra Baratchi , Kamal Jamshidi
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In th...
A Systematic Approach for Constructing Static Class Diagrams from Software Requirements
The trend towards the use of object-oriented methods for software systems development has made it necessary for the use of object-oriented approaches in object-oriented software systems development. Class diagrams repres...
Co-Recursively Enumerable Triods with Computable Endpoints
Recursive sets in the Euclidean space are those sets which an be effectively approximated by finitely many points for an arbitrary given precision. On the other hand, co-recursively enumerable sets are those sets whose...
A Probabilistic Approach of Coverage prediction in Mobile Ad hoc Networks
A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. It’s very difficult to select of optimal path due to different factors affects the stability of t...
Human Gait Recognition Using Bezier Curves
Gait recognition refers to automatic identification of an individual based on the style of walking. It is a new biometrics recognition technology. It has accomplished a series of achievements in scientific research in re...