Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN

Abstract

Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.

Authors and Affiliations

Gottipati Ravi Teja, Maddali M. V. M.

Keywords

Related Articles

Privacy-Preserving using Profile Matching for Medical Report Analysis

Wireless and mobile communication has brought up major features to individuals. Mobile Social Networks (MSNs) is not so far behind considering its effective use. Utilizing these services, individual has to pay its perso...

Improved Methodology for Storage and Quick Retrieval of Hard Files using 5s Principles

Certain departments of large organizations have to maintain heavy amount of data in printed form. This includes project wise files, meeting reports, important project related documents etc. for each year since the incep...

A Survey on Face Recognition Process

Face recognition from under uncontrolled environment is still a big unsolved problem. Robust Face Recognition is needed today, because it has main role bio security. Recognition is done in two ways, with user cooperatio...

Comparison and Analysis of Existing Security Protocols in Wireless Networks

Today over the past few years, there has been a rapid growth in the use of wireless networks. Since they have introduced in the mid 1990s, they have proliferated among home users and have taken over organizations whethe...

Growth and Characterization of Triglycine Sulphate (TGS) Crystal mixed with Ammonium Dihydrogen Orthophosphate (ADP)

Triglycine sulphate (TGS) is a ferroelectric crystal. The ferroelectric crystals find important applications in optoelectronics, photonics and used in the fabrication of high sensitivity infrared detectors at room tempe...

Download PDF file
  • EP ID EP21801
  • DOI -
  • Views 210
  • Downloads 4

How To Cite

Gottipati Ravi Teja, Maddali M. V. M. (2016). Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk/articles/-A-21801