Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.
Authors and Affiliations
Gottipati Ravi Teja, Maddali M. V. M.
Structural Health Monitoring Of RCC Slab Using PZT Material: An Overview
In order to study the damage detection or structural health monitoring of RCC slab by the using of PZT smart material. During the process of monitoring or analyzing the damage, simply PZT patches are attached to the sur...
An EMD Based Approach for the Detection of Premature Ventricular Contraction
This paper gives a novel method for detection of Premature Ventricular Contraction (PVC) based on Empirical Mode Decomposition(EMD) of Electrocardiogram (ECG) signal. Four linear and one nonlinear feature are used for E...
Offline Signature Recognition Using PCA-FFNN Method and Adaptive Variance Reduction and Invariant Moment Feature Extraction
Although offline handwritten signature recognition has been frequently researched, it nevertheless calls for an improvement of popularity rate. Most of present techniques attention on feature extraction (FE) to improve...
Feature Level Fusion Using Finger Knuckle Print Multi-Instance biometric
Biometric-based individual verification is receiving an extensive interest in the area of research due to its far above the ground applicability in a wide range of security applications. Among these, hand-based biometri...
Study of SWT-ANN Based Indoor Optical Wireless Communication System: A Review
This paper reviews on optical wireless system using stationary wavelet and neural network. High-speed wireless optical communication links have become more popular for personal mobile applications. This is a consequence...