An Attack-Resilient Computation Algorithm To Compute Successful Aggregates In The Presence Of Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
In-network data aggregation can decrease the amount of communication and hence the energy consumed especially in large WSNs. The main idea is to unite partial results at intermediate nodes during message routing. One approach is to build a spanning tree rooted at the BS and then perform in-network aggregation along the tree. The important aggregates considered by the research community include Count and Sum. It is simple to simplify these aggregates to predicate Count and Sum. We can also simply expand a Sum algorithm to compute Standard Deviation and Statistical Moment of any order. The possibility of node compromise introduces more challenges because most of the existing in-network aggregation algorithms have no provisions for security. A compromised node might effort to prevent the aggregation process by launching several attacks such as eavesdropping, jamming, message dropping, message fabrication and so on. This paper focuses on a subclass of these attacks in which the adversary aims to cause the BS to derive an incorrect aggregate.
Authors and Affiliations
P. Raj Priyanka, B. Lakshmana Rao
CDPP: Inter firewall Rules Redundancy Detection In Firewall
Firewalls playing very important role to provide security to private networks and organizations. . But the firewall policies cannot be communal across domains because it contains confidential information and security...
Delay Analysis of AODV Routing Protocol
MANET is a mobile ad-hoc network. It is an infrastructure less communication network through which we can send the information from source to destination in the form of packets using different routing protocols. Ther...
Detection of Brain Tumor Using PCA With SVM
In the field of medical image processing, detection of brain tumor from magnetic resonance image (MRI) brain scan has become one of the most active research. Detection of the tumor is the main objective of the system...
Coverage Modeling For Verification Of Floating Point Arithmetic Units
Scope displaying is one of the key errands of the confirmation stream in frameworks improvement. The subsequent model is regularly used to assess the advancement and nature of the check process; it likewise gives a v...
Pseudo Random Number Generator Using Reseeding Module
In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which t...