Secure Data Aggregation In Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network is separated into number of clusters, each cluster is headed by an aggregator and the aggregators are directly connected to sink. The aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes in first round of data aggregation. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.
Authors and Affiliations
Shaik Mohammad Rafi, K. Subbarao
Capabilities and Limitations of Path Gain Adjustment in Harmonic Rejection Mixers
Harmonic rejection ratios (HRR) of harmonic rejection mixers (HRM) are limited because of gain and phase inaccuracies. Gain and phase calibration can be employed to enhance HRRs. This paper deals in a systematic way...
Design of Asynchronous Viterbi Decoder using VHDL for Low Power Consumption
In today’s digital communication systems, Convolutional codes are widely utilize in channel coding techniques. The Viterbi decoder due to its efficient performance is broadly used for decoding the convolution codes....
Access Control And Privacy Preserving Mechanisms On Sensitive Data
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...
ECG Noise Reduction By Different Filters – A Comparative Analysis
The electrocardiogram (ECG or EKG) is a diagnostic tool that measures and records the electrical activity of the heart in exquisite detail. The electrocardiogram is commonly used to detect abnormal heart rhythms and...