Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 4
Abstract
In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to perfectly compute aggregates (e.g., predicate Count, Sum) unkindness of message losing resultsfrom node and communication failures. But this aggregation framework does not solve the problems which are appearing at base station side. These problems may occur due to the irrespective of the network size, the per node communication over-head. In this paper, I make the synopsis diffusion approach secure against attacks in which compromised nodes put in false sub aggregate values. In particular, now present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false input.In this paper, I study the compromised node and denial-of-service is the two key attacks in wireless sensor networks. We disagree that multipath routing approaches are highly helpless to such attacks. So, for these attacks we develop the mechanisms that generate randomized multipath routes. In this designing, the routes are taken by the shares of dissimilar packets transf
Authors and Affiliations
S. Vijaya Kumar
An Improvement in Power Management in green Computing using Neural Networks
The green computing is the technology which is based on the environmental use of computer related resources. The computer related resources includes processing units, storage units etc. In such type of technology...
A Survey and Research Proposal of Plant Leaf Disease Diagnosis and Classification on Mobile Devices
Abstract: A plant disease is defined as anything that prevents a plant from performing to its maximal potential. A plant disease has impacted society and world olden times. Plant diseases have caused enormous economic lo...
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...
Face Recognition Revisited On Pose, Alignment, Color, Illumination And Expression- Pyten
Abstract : Growing interest in intelligent human computer interactions has motivated a recent surge in research on problems such as pose estimation, illumination variation, color differences, alignment distinction and ex...
Protocols for detection of node replication attack on wireless sensor network
Wireless sensor network has many small sensor nodes that work in collaborative manner to achieve a specific task. But it is deployed in unattended environment and that is why it is prone to attacks. These a...