Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.
Authors and Affiliations
Gottipati Ravi Teja, Maddali M. V. M.
Navnath Dahifale, Sachin Kadam, Swapnil Sabale, Prof. Chandan Chaubey
This paper describes the RFID based automatic toll-tax collection system for toll gate. Most of the toll collection systems commonly used in India is manual transaction. Now a days, streams of traffic are increased and...
A Study on Error Coding Techniques
There are numerous error coding techniques in the field of digital communication. They are utilized to detect/correct single bit or multiple bit errors. In this paper commonly used codes like Hamming codes, CRC and Reed...
Balanced Pipeline Stages with Minimum Logic Delay on Encrypted High Speed Data Using FPGA Based AES Algorithm
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunicatio...
Design of an Improve Cassava Peeling Machine
All the unit operations involved in the post-harvest processing of cassava such as grating, drying, milling, pressing, sieving, molding, extrusion and frying have been mechanized successfully. However, cassava peeling r...
Unsteady Convective Heat and Mass Transfer Flow In A Vertical Channel with Dissipative and Radiation Effects
We analyze the thermo diffusion effect on unsteady convective heat and mass transfer flow of a viscous fluid through a porous media in a vertical channel on whose walls a traveling thermal wavy is imposed. The governed...