International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 257

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10


     

Energy Efficient Data Aggregation of Wireless Sensor Network and Attacks using Error Bound

Yogita Hukre, S. S. Dongre


Abstract: A wireless sensor networks (WSNs) consist of as many numbers of nodes which can communicate with each other. The sensor nodes consume energy during sensing, processing and transmission. In Wireless sensor network power and energy resources are limited. The number of sensor nodes is deployed in physical area. If each node sends information to the base station, energy is wasted and therefore the network energy are consume quickly. In this paper for data aggregation the READA technique will be used with some error bound. Redundancy Elimination for accurate data Aggregation (READA) uses a grouping and compression mechanism to get rid of duplicate information within the aggregated set of information to be sent to the base station. In wireless sensor network, security and energy efficiency issues are found. In this paper, different types of attacks associated with WSN and their effects are discussed.


Keywords: Aggregation techniques, Error Bound, Energy Efficiency, Injection Attack, Sensor Networks, Sybil Attack


Edition: Volume 4 Issue 4, April 2015


Pages: 2625 - 2629



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Yogita Hukre, S. S. Dongre, "Energy Efficient Data Aggregation of Wireless Sensor Network and Attacks using Error Bound", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 2625-2629, https://www.ijsr.net/getabstract.php?paperid=SUB153682, DOI: https://www.doi.org/10.21275/SUB153682



Similar Articles

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 354 - 356

Secure Routing to Prevent Sybil Attack in Sensor Networks

Mohammed Abrar, P. Subhadra

Share this Article



Top