Cdama: concealed data aggregation scheme for multiple applications in wireless sensor networks

Authors

  • Johnson J PG Scholar, Dept of CSE, PG Department of Computer Science & Engineering Hindusthan Institute of Technology, Coimbatore
  • Uma S Prof. and Head, PG Department of Computer Science and Engineering Hindusthan Institute of Technology, Coimbatore
  • Kumar MM Asst. Prof. PG Department of Computer Science & Engineering Hindusthan Institute of Technology, Coimbatore

Keywords:

Wireless sensor networks, Sensor node, Concealed data aggregation for multiple applications, Cluster head, Aggregators, Elliptic curve method, Privacy homomorphic encryption

Abstract

Generally, Data Mining is the process of analysing data from different perspectives and summarizing the information. Wireless sensor networks (WSNs) consist of thousands of sensor nodes (SN) that gather data from deployed environments. Efficient data aggregation scheme with security is needed to provide security in the wireless sensor networks as they may suffer unauthorized aggregation attacks. In previous homomorphic encryptions have been applied to conceal communication during aggregation such that enciphered data can be aggregated algebraically without decryption. It reduces a large amount of transmission and it is the most practical technique. Although data aggregation could significantly reduce transmission, it is vulnerable to some attacks. The objective of the proposed system is to design a scheme to detect these attacks or mitigate their impact. It can change the path in the intermediate level. So this will not get any aggregation problem and packet delivery issue.

References

. A. Perrig, J. Stankovic, and D. Wagner, “Security in Wireless Sensor Networks,” Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.

. B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proc. First Int’l Conf. Embedded Networked Sensor Systems, pp. 255-265, 2003.

. D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.

. H. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-based Data Aggregation Protocol for W ireless Sensor Networks,” Proc.

IEEE 60th Vehicular Technology Conf. (VTC’04-fall), vol. 7, 2004.

. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.

. L. Hu and D. Evans, “Secure Aggregation for Wireless Networks,” Proc. Symp. Applications and the Internet Workshops, pp. 384-391,

. R. Min and A. Chandrakasan, “EnergyEfficient Communication for Ad-Hoc Wireless Sensor Networks,” Proc. Conf. Record of the 35th Asilomar Conf. Signals, Systems and Computers, vol. 1, 2001.

. S. Peter, D. Westhoff, and C. Castelluccia, “A Survey on theEncryption of Converge castTraffic with In-Network Processing,”IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20-34, Jan.-Mar. 2010.

. S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,”ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.

. Y. Wu, D. Ma, T. Li, and R.H. Deng, “Classify Encrypted Data in Wireless Sensor Networks,” Proc. IEEE 60th Vehicular Technology Conf., pp. 3236-3239, 2004.

Downloads

Published

2024-02-26

How to Cite

Johnson, L., Uma, S., & Kumar, M. M. (2024). Cdama: concealed data aggregation scheme for multiple applications in wireless sensor networks. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(03), 629–632. Retrieved from https://ijact.in/index.php/j/article/view/113

Issue

Section

Original Research Article

Similar Articles

<< < 33 34 35 36 37 38 39 40 41 42 > >> 

You may also start an advanced similarity search for this article.