Secure Data Aggregation In Wireless Networks

Abstract

Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network is separated into number of clusters, each cluster is headed by an aggregator and the aggregators are directly connected to sink. The aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes in first round of data aggregation. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.

Authors and Affiliations

Shaik Mohammad Rafi, K. Subbarao

Keywords

Related Articles

Capabilities and Limitations of Path Gain Adjustment in Harmonic Rejection Mixers

Harmonic rejection ratios (HRR) of harmonic rejection mixers (HRM) are limited because of gain and phase inaccuracies. Gain and phase calibration can be employed to enhance HRRs. This paper deals in a systematic way...

Design of Asynchronous Viterbi Decoder using VHDL for Low Power Consumption

In today’s digital communication systems, Convolutional codes are widely utilize in channel coding techniques. The Viterbi decoder due to its efficient performance is broadly used for decoding the convolution codes....

Access Control And Privacy Preserving Mechanisms On Sensitive Data

The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....

Secure Authentication Schemes

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...

ECG Noise Reduction By Different Filters – A Comparative Analysis

The electrocardiogram (ECG or EKG) is a diagnostic tool that measures and records the electrical activity of the heart in exquisite detail. The electrocardiogram is commonly used to detect abnormal heart rhythms and...

Download PDF file
  • EP ID EP27810
  • DOI -
  • Views 268
  • Downloads 0

How To Cite

Shaik Mohammad Rafi, K. Subbarao (2014). Secure Data Aggregation In Wireless Networks. International Journal of Research in Computer and Communication Technology, 3(1), -. https://europub.co.uk/articles/-A-27810