Straining Attacker’s Impact in WSN using Secure Data Aggregation

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

"Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy. "

Authors and Affiliations

Keywords

Related Articles

Measuring Consciousness Quotient -A Study of Its Influence on Employee's Work Performance and Organizational Outcomes

The present study has been done to establish a link between Consciousness levels of individuals with their performance at organization. This is just a base study which research on finding the literature available on expe...

Data Loss Prevention: Secure Important Data & Prevent By Threats

it is very important to protect the business data from all kind of data breach attacks for every organization to maintain the brand reputation and customer faith. Security of data is the biggest challenges for the organi...

Implementation of Wireless Sensor Network for Real Time Monitoring of Agricultural Parameter

Present paper objective is to develop a smart wireless sensor network (WSN) for an agricultural environment. Monitoring agricultural environment for various factors such as soil moisture, temperature and humidity along w...

Ultrasonographic Evaluation of Lower Uterine Segment Thickness in Patients with Previous Caesarean Section

"Objective:To evaluate the lower uterine segment (LUS) thickness in women with previous caesarean section and to determine the critical thickness above which safe vaginal delivery is predictable. Methods: A descriptiv...

Who and Where Should they turn to? The Plight of Street Children

This paper was motivated by observation(s) of pathetic scenes of street children looking for food in waste bins; teenage 'street mothers

Download PDF file
  • EP ID EP340081
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

(2015). Straining Attacker’s Impact in WSN using Secure Data Aggregation. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-340081