Secure Data Aggregation In Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network is separated into number of clusters, each cluster is headed by an aggregator and the aggregators are directly connected to sink. The aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes in first round of data aggregation. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.
Authors and Affiliations
Shaik Mohammad Rafi, K. Subbarao
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...
Design and Implementation of FPGA Radix-4 Booth Multiplication Algorithm
Fast multipliers are essential parts of digital signal processing systems.The system performance is based on the performance of multiplier used in the system, because it is the slowest component among all components...
Minimizing Packet Delay Rate in Tree based wireless sensor networks
In this advanced and fast world people do not want to wait much for collecting information. Hence now a day’s collecting information in a faster way became a challenge for the researchers. Faster data collection in W...
An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories
Vehicle scan perform as influential sensors and form movable sensor networks. Vehicular networks have a lot of attractive applications, such as driving safety, intelligent transport, infrastructure monitoring and bui...
Security Monitoring System Design Based on ARM9 and Embedded Face Recognition System
In this paper, proposed system is designed to recognize the person based on preloaded database images in controller. Our Embedded system using Friendly ARM9 based BSP S3C2440 has feature of image/video processing with...