To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack

Abstract

The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather forecasting and oil and gas pipeline leakages. To reduce communication overhead and energy consumption a new concept is introduced that is data aggregation means partial data is aggregated in intermediate nodes. Existing synopsis diffusion framework can’t separate the false Aggregate data which is generated by compromised nodes by the attacker. We propose a new protocol for mobile sensing to obtain the sum aggregate of time-series data in the presence of an untrusted aggregator. The proposed protocol employs an additive homomorphic encryption and a novel key management scheme based on efficient HMAC to ensure that the aggregator can only obtain the sum of all sensor’s data, without knowing individual sensor’s data or intermediate result.

Authors and Affiliations

G Jaya lakshmi, Usha Devi SSSN

Keywords

Related Articles

Detection and management of SPIT calls in VoiceOver-IP Services

Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...

EFFICIENT APPROACH FOR PRIVACY PRESERVING MICRODATA PUBLISHING USING SLICING

Many agencies and organizations are willing to release the data they collected to other parties for research and the formulation of public policies. Data often contains personally identifiable information and therefor...

A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm

for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...

Generalization Algorithm For Prevent Inference Attacks In Social Network Data

Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customiz...

Minimizing energy utilization and source anonymity in wireless Sensor Networks

Monitoring networks consist of energy unnatural nodes that are expected to function over an extended period of time making energy competent monitoring a chief feature for unattended networks. In such situation nodes...

Download PDF file
  • EP ID EP28252
  • DOI -
  • Views 290
  • Downloads 3

How To Cite

G Jaya lakshmi, Usha Devi SSSN (2015). To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28252