Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.
Authors and Affiliations
Gottipati Ravi Teja, Maddali M. V. M.
IGBT based Multiport Bidirectional DC-DC Converter with Renewable Energy Source
Future renewable energy systems will need to interface with several energy sources such as fuel cells and photovoltaic array with battery backup. For standalone systems, backup storage is required for dynamic response....
QUADCOPTER: Four Rotor Copter
Recently, many studies are being done for providing a proper detecting method which can track the persons in different situations with high efficiency. Although, several studies have been done for detect and tracking hu...
Pigment Production of Pathogenic Bacteria Using Randia Longispina
The present investigation is aimed to carry out the pigment production of pathogenic bacteria using Randia longispina against some bacterial species. Anti proliferative activity was evaluated by R. longispina seed extra...
Stock Market Price Trend Forecasting using Machine Learning
support vector machine is a machine learning technique used in to forecast stock prices. Stock market price forecasting is the process of determining the future value of a company’s stock. This study uses daily closing...
Working, Advantages of Green Engine and Development Using CNG
This paper gives brief introduction about green engines, which is most important discovery in today’s world. The green engine has unique features than conventional engine. There are many disadvantages of conventional en...