Secure Data Aggregation In Wireless Networks

Abstract

Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data confidentiality. In this study, we propose a securing node capture attacks for hierarchical data aggregation in wireless sensor networks. Initially network is separated into number of clusters, each cluster is headed by an aggregator and the aggregators are directly connected to sink. The aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes in first round of data aggregation. When any node within the group needs to transfer the data, it transfers slices of data to other nodes in that group, encrypted by individual authentication keys. Each receiving node decrypts, sums up the slices and transfers the encrypted data to the aggregator. The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. The set of nodes is reselected with new set of authentication keys in the second round of aggregation. By simulation results, we demonstrate that the proposed technique resolves the security threat of node capture attacks.

Authors and Affiliations

Shaik Mohammad Rafi, K. Subbarao

Keywords

Related Articles

Multi-interface Ad-hoc Wireless Network with AODV

Wireless technologies, such as IEEE 802.11, that are used for ad hoc networks provides mobile node with multiple interfaces and multiple channels to make efficient use of network capacity. This paper studies multiple...

2 Khz Mono Pulse Acoustic Signal Generation for SODAR Application Using PC Sound Card And MATLAB graphical User Interface

The SODAR (Sound Detection and Ranging) is an instrument that to measure the wind profile in the lower atmosphere of the earth. The volume measurement of the wind profile by remote sensing device, like SODAR have a g...

A Novel Approach for Reducing Routing Overhead In Mobile Ad hoc Network

The Mobile Adhoc Networks(MANET) are the examples of infrastructure less networks and are having frequent occurrence of route discoveries. In MANET, the routing has been performed with the help of neighbouring infor...

Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links

The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There aris...

A Survey On Multi_Criteria Offloading Decision For Mobile Cloud Computing In Heterogeneous Network

Mobile cloud computing is an technique where mobile applications be built, motorized by means of cloud computing..Wireless network include incomplete resources similar to battery life,storage space capacity,system ba...

Download PDF file
  • EP ID EP27810
  • DOI -
  • Views 253
  • Downloads 0

How To Cite

Shaik Mohammad Rafi, K. Subbarao (2014). Secure Data Aggregation In Wireless Networks. International Journal of Research in Computer and Communication Technology, 3(1), -. https://europub.co.uk/articles/-A-27810