Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 4
Abstract
In a Wireless Sensor Network (WSN), specifically data aggregation reduces the amount of communication and energy utilization. Newly, the research centre has proposed a strong aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to perfectly compute aggregates (e.g., predicate Count, Sum) unkindness of message losing resultsfrom node and communication failures. But this aggregation framework does not solve the problems which are appearing at base station side. These problems may occur due to the irrespective of the network size, the per node communication over-head. In this paper, I make the synopsis diffusion approach secure against attacks in which compromised nodes put in false sub aggregate values. In particular, now present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false input.In this paper, I study the compromised node and denial-of-service is the two key attacks in wireless sensor networks. We disagree that multipath routing approaches are highly helpless to such attacks. So, for these attacks we develop the mechanisms that generate randomized multipath routes. In this designing, the routes are taken by the shares of dissimilar packets transf
Authors and Affiliations
S. Vijaya Kumar
Improving Sales in SME Using Internet Marketing
In Indonesia, SMEs are the backbone of the Indonesian economy. Number of SMEs until 2011 to reach around 52 million. SMEs in Indonesia is very important for the economy because it accounts for 60% of GDP an...
Energy Consumption Using Network Stability And Multi-hop Protocol For Link Efficiency in Wireless Body Area Networks
Abstract: In this paper, we propose a minimum, power efficient and max throughput routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop topology to achieve minimum energy consumption and longer...
Image Steganography and Global Terrorism
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims t...
Investigating DHCP and DNS Protocols Using Wireshark
For different computers to communicate on the same network or on different networks they need to know one another’s IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a...
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...