Straining Attacker’s Impact in WSN using Secure Data Aggregation
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
"Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy. "
Factors Influencing Implementation of Strategic Plans in Public Secondary Schools in Lari District, Kiambu County
Previous studies have indicated that good strategies have been written but very little has been achieved in their implementation. It has further been argued that only 10% of formulated strategies are successfully implem...
Preprocessing of Various Data Sets Using Different Classification Algorithms for Evolutionary Programming
The performance analysis and preprocessing of data is very important in data mining. Here, the performance is analyzed on various classification algorithms using different data sets so as to identify which results the be...
To Compensate AC loads using DSTATCOM
DSTATCOM is very popular in compensating the linear, nonlinear, balanced and unbalanced loads. Any change in the load affects the DCLV directly. The proper operation of DSTATCOM requires variation of the DCLV within the...
A Review on Performance Analysis of Cloud Computing Services for Scientific Computing
Cloud computing has emerged as a very important commercial infrastructure that promises to reduce the need for maintaining costly computing facilities by organizations and institutes. Through the use of virtualization an...
A Study of Students’ Conceptual Understanding about the Content of EVS Subject at Primary Level
A study entitled ‘A Study of Students’ Conceptual Understanding about the Content of EVS Subject at Primary Level’ has been conducted on students of schools of experimental and control groups to promote the thinking skil...