Straining Attacker’s Impact in WSN using Secure Data Aggregation

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

"Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy. "

Authors and Affiliations

Keywords

Related Articles

Review on Floating Point Adder and Converter Units Using VHDL

Abstract: Floating Point arithmetic is the most used way of approximating real number arithmetic for performing numerical calculations on modern computers. The advantage of floating-point representation is that it can su...

Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Cloud Computing is called future generation architecture for computing. Generally cloud computing is a large scale and internet based computing paradigm in which pool of resources, shared software information is accessib...

Effect of DMPA and A Polyherbal Drug on Histomorphometry of Uterus in Adult Female Rats

Adult female albino rats were treated with injectable contraceptive (Demedroxyprogesteroneacetate-DMPA) and then treated with a polyherbal drug containing herbal plants extracts which are proved to have uterotonic effect...

Optimization of Growth Medium in Microbial Fuel Cell for Electricity Production by Paenibacillus

Microbial fuel cell ( MFC ) represents a new method for electricity generation and waste water treatment. Microbial fuel cells are devices that can use bacterial metabolism to produce an electrical current from a wide ra...

An Implementation of Watershed based Image Segmentation Algorithm using FPGA Processor

In this work, the watershed algorithm is used as a method in solving the image segmentation problem. However, of the many variants of the watershed algorithm not all are equally well suited for hardware implementation....

Download PDF file
  • EP ID EP340081
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

(2015). Straining Attacker’s Impact in WSN using Secure Data Aggregation. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-340081