Secure Data Aggregation In Wireless Networks

Abstract

Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network is separated into number of clusters, each cluster is headed by an aggregator and the aggregators are directly connected to sink. The aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes in first round of data aggregation. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.

Authors and Affiliations

Shaik Mohammad Rafi, K. Subbarao

Keywords

Related Articles

A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT

Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...

Cooperative Caching in Wireless P2P Networks: Design, Implementation and Evaluation

In this paper proposing cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design...

Privacy Preserving using Slicing Technique

Privacy Preserving on microdata publishing different anonymization techniques named as generalization and bucketization have been proposed. In generalization amount of information loses on high-dimensional data. Buc...

The Journey of Big Data: 3 V’s to 32 V’s

Every engineering and science field facing “big” data problem. Big data is one of emerging field in data science research. Different people can do as many different things with big data. So in this paper we tried to pre...

An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation

The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...

Download PDF file
  • EP ID EP27810
  • DOI -
  • Views 276
  • Downloads 0

How To Cite

Shaik Mohammad Rafi, K. Subbarao (2014). Secure Data Aggregation In Wireless Networks. International Journal of Research in Computer and Communication Technology, 3(1), -. https://europub.co.uk/articles/-A-27810