An Attack-Resilient Computation Algorithm To Compute Successful Aggregates In The Presence Of Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
In-network data aggregation can decrease the amount of communication and hence the energy consumed especially in large WSNs. The main idea is to unite partial results at intermediate nodes during message routing. One approach is to build a spanning tree rooted at the BS and then perform in-network aggregation along the tree. The important aggregates considered by the research community include Count and Sum. It is simple to simplify these aggregates to predicate Count and Sum. We can also simply expand a Sum algorithm to compute Standard Deviation and Statistical Moment of any order. The possibility of node compromise introduces more challenges because most of the existing in-network aggregation algorithms have no provisions for security. A compromised node might effort to prevent the aggregation process by launching several attacks such as eavesdropping, jamming, message dropping, message fabrication and so on. This paper focuses on a subclass of these attacks in which the adversary aims to cause the BS to derive an incorrect aggregate.
Authors and Affiliations
P. Raj Priyanka, B. Lakshmana Rao
A Public Auditing Framework for Cloud Storage Security
Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources pro...
A System To Minimize The Storing And Managing Secret Keys Expense Using Kac In Cloud
Information outsourcing which helps in the arrangement need organization of corporate information. It is likewise utilized as a core innovation at the back of various online services for individual applications. Comm...
Efficient and Reliable Transmission Mechanism for Wireless Nodes
In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which w...
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...
Modeling of Single-Phase Semi-Z-source Inverter
This paper presents several single-phase non-isolated semi-Z-source inverters for small distributed power generator in grid-connected applications with low cost and doubly grounded features. These semi-Z-source invert...