International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 274

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10


     

Straining Attacker's Impact in WSN using Secure Data Aggregation

Akshaya Shah, Dr. K. N. Honwadkar


Abstract: Wireless sensor networks (WSNs) are significantly found in several purposes, such as volcano and fireplace tracking, metropolitan sensing, and border surveillance. In a large WSN, in-network information aggregation considerably reduces the total amount of connection cost and power consumption. The research community planned a loss-resilient aggregation construction called synopsis diffusion, which uses duplicate-insensitive algorithms on prime of multipath routing schemes to precisely compute aggregates. But, this aggregation construction does not handle the issue of false sub aggregate values led by compromised nodes. That attack might cause large mistakes in the aggregate computed at the beds base station that will be the main node in the aggregation hierarchy. In this paper, we make the synopsis diffusion approach secure against the above mentioned attack presented by compromised nodes. Particularly, we present an algorithm allow the beds base station to solidly compute predicate rely or sum even in the clear presence of this kind of attack. Our attack-resilient computation algorithm computes the true aggregate by filter out the benefits of compromised nodes in the aggregation hierarchy.


Keywords: Data aggregation, hierarchical aggregation, in-network aggregation, sensor network security, synopsis diffusion, attack resilient


Edition: Volume 4 Issue 1, January 2015


Pages: 1028 - 1030



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Akshaya Shah, Dr. K. N. Honwadkar, "Straining Attacker's Impact in WSN using Secure Data Aggregation", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1028-1030, https://www.ijsr.net/getabstract.php?paperid=SUB15274, DOI: https://www.doi.org/10.21275/SUB15274



Similar Articles

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3253 - 3257

BIST Based Secure Data Aggregation in Wireless Sensor Network

Rakesh Kumar Ranjan, S. P. Karmore

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3036 - 3040

Dependable Routing Approach for In-Network Aggregation in Wireless Sensor Network

Soniya B. Patil, Dr. Aarti Dixit

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1287 - 1291

Survey on Straining Attacker's Impact in WSN using Secure Data Aggregation

Devendra Hapase, S. D. Satav

Share this Article

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 320 - 323

A Trivial And Consistent Routing With In-Network Aggregation In Wireless Sensor Networks

C.Pravallika, T.Venkata Naga Jayudu

Share this Article

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1882 - 1884

Catching Moles and Packet Droppers in Wireless Sensors Network

Mohammed Hajee, Mohammed Abdul Rawoof

Share this Article
Top