Downloads: 109 | Views: 257
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10
Energy Efficient Data Aggregation of Wireless Sensor Network and Attacks using Error Bound
Yogita Hukre, S. S. Dongre
Abstract: A wireless sensor networks (WSNs) consist of as many numbers of nodes which can communicate with each other. The sensor nodes consume energy during sensing, processing and transmission. In Wireless sensor network power and energy resources are limited. The number of sensor nodes is deployed in physical area. If each node sends information to the base station, energy is wasted and therefore the network energy are consume quickly. In this paper for data aggregation the READA technique will be used with some error bound. Redundancy Elimination for accurate data Aggregation (READA) uses a grouping and compression mechanism to get rid of duplicate information within the aggregated set of information to be sent to the base station. In wireless sensor network, security and energy efficiency issues are found. In this paper, different types of attacks associated with WSN and their effects are discussed.
Keywords: Aggregation techniques, Error Bound, Energy Efficiency, Injection Attack, Sensor Networks, Sybil Attack
Edition: Volume 4 Issue 4, April 2015
Pages: 2625 - 2629
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Downloads: 106
Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 193 - 195Application for Detecting and Preventing SQL Injection Attacks using Web Service
Anuja A. Patil, Ketaki H. Pangu
Downloads: 108
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 242 - 245An Approach to Detect and Prevent SQL Injection Attacks using Web Service
Shabnam R. Makanadar, Vaibhav V. Solankurkar
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 354 - 356Secure Routing to Prevent Sybil Attack in Sensor Networks
Mohammed Abrar, P. Subhadra