Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN

Abstract

Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.

Authors and Affiliations

Gottipati Ravi Teja, Maddali M. V. M.

Keywords

Related Articles

Identification of Factors Inhibiting Human Resource Development and Productivity Improvement in Indian Construction Firms

The motіve of thіs research іs to boost human resource development approach, declіne the mіsmatch between requіred and avaіlable skіlled labor and to dіscuss the sіgnіfіcance of іgnorіng tіhe appeal of craftsmen. Perhap...

An investigation study on cancer and its preventions

Cancers are usually named using -carcinoma, -sarcoma or -blastoma as a suffix, with the Latin or Greek word for the organ or tissue of origin as the root. For example, cancers of the liver parenchyma arising from malign...

Student And Invigilator Authentication Through Mobile Application

In present day the management of examination is done manually. The main problem with manual system is it takes more effort and physical space to keep track of paper documents like hall tickets, to find information and t...

Secure Data Sharing in Big Data

The Storage of data is gradually increased in a huge amount. The data may contains some important or sensitive information store on a big data platform. The main use of this sharing is to share the data between the user...

Reliability, Smart Vision and Intelligence Perspective of Robots in Social World

To justify the relationship of robots in social world depends on perception. It becomes a problem to perceive the things intelligently and control the activities according to the environment by robots. Robots need to de...

Download PDF file
  • EP ID EP21801
  • DOI -
  • Views 257
  • Downloads 4

How To Cite

Gottipati Ravi Teja, Maddali M. V. M. (2016). Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk/articles/-A-21801