Cdama: concealed data aggregation scheme for multiple applications in wireless sensor networks
Keywords:
Wireless sensor networks, Sensor node, Concealed data aggregation for multiple applications, Cluster head, Aggregators, Elliptic curve method, Privacy homomorphic encryptionAbstract
Generally, Data Mining is the process of analysing data from different perspectives and summarizing the information. Wireless sensor networks (WSNs) consist of thousands of sensor nodes (SN) that gather data from deployed environments. Efficient data aggregation scheme with security is needed to provide security in the wireless sensor networks as they may suffer unauthorized aggregation attacks. In previous homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. It reduces a large amount of transmission and it is the most practical technique. Although data aggregation could significantly reduce transmission, it is vulnerable to some attacks. The objective of the proposed system is to design a scheme to detect these attacks or mitigate their impact. It can change the path in the intermediate level. So this will not get any aggregation problem and packet delivery issue.
References
. A. Perrig, J. Stankovic, and D. Wagner, “Security in Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
. B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proc. First Int’l Conf. Embedded Networked Sensor Systems, pp. 255-265, 2003.
. D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
. H. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-based Data Aggregation Protocol for W ireless Sensor Networks,” Proc.
IEEE 60th Vehicular Technology Conf. (VTC’04-fall), vol. 7, 2004.
. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
. L. Hu and D. Evans, “Secure Aggregation for Wireless Networks,” Proc. Symp. Applications and the Internet Workshops, pp. 384-391,
. R. Min and A. Chandrakasan, “EnergyEfficient Communication for Ad-Hoc Wireless Sensor Networks,” Proc. Conf. Record of the 35th Asilomar Conf. Signals, Systems and Computers, vol. 1, 2001.
. S. Peter, D. Westhoff, and C. Castelluccia, “A Survey on theEncryption of Converge castTraffic with In-Network Processing,”IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20-34, Jan.-Mar. 2010.
. S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,”ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.
. Y. Wu, D. Ma, T. Li, and R.H. Deng, “Classify Encrypted Data in Wireless Sensor Networks,” Proc. IEEE 60th Vehicular Technology Conf., pp. 3236-3239, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.