Detecting malicious nodes using data aggregation protocols in wireless sensor networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    At present scenario, sensor devices are used in various fields for gathering information so all those data should be secured safely. Securing data is an important role in Wireless Sensor Networks (WSN). WSN is extremely essential for the purpose of reducing the complete redundancy and energy consumption during gathering data among sensor nodes. Optimized data aggregation is needed at cluster head and Base Station (BS) for secured data transmission. Data aggregation is performed in all routers while forwarding data from source to destination node. The complete life time of sensor networks is reducing because of using energy inefficient nodes for the purpose of aggregation. So this paper introduces the optimized methods for securing data (OMSD) which is trust based weights and also completely about the attacks and some methods for secured data transmission. 


  • Keywords


    Securing Data, Aggregation, Sensor, Energy, Attack, Network Lifetime and Overhead

  • References


      [1] Zhu W, Xiang Y & Zhou J, “Secure localization with attack detection in wireless sensor networks”, International Journal of Information Security, Vol.10, No.3, (2011), pp.155-171.

      [2] Roy S, Conti M, Setia S & Jajodia S, “Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact”, IEEE Transactions on Information Forensics and Security, Vol.9, No.4, (2014), pp.681-694.

      [3] Kavitha T & Sridharan D, “Security vulnerabilities in Wireless Sensor Networks: A survey”, Journal of Information Assurance and Security, Vol.5, (2010), pp.31-44.

      [4] Balamurugan P, “Geometric Designs for Energy and Delay Computing for Data Gathering in Wireless Sensor Networks”, journal of current computer science and technology, Vol.5, No.5, (2015), pp.31-38.

      [5] Sadek AK, Yu W & Liu KJR, “On the energy efficiency of cooperative communications in wireless sensor networks”, ACM Transactions on Sensor Networks, Vol.6, No.1, (2009).

      [6] Jacobs IS & Bean CP, “Fine particles, thin films and exchange anisotropy”, Magnetism, Vol.III, (1963), pp.271–350.

      [7] Pradeepa K, Anne WR & Duraisamy S, “Design and implementation issues of clustering in Wireless Sensor Networks”, International Journal of Computer Applications, Vol.47, No.11, (2012), pp.23-28.

      [8] Alcaraz C, Lopez J & Roman R, “Selecting Key Management Schemes for Wireless Sensor Networks application”, Journal of Computers and Security, Vol.31, No.8, (2012), pp.956-966.

      [9] Azarderskhsh R & Reyhani A, “Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks”, Eurasip Journal on Wireless Communications and Networking, (2011), pp.1-12

      [10] Chan AC & Castelluccia C, “A security framework for privacy preserving data aggregation in wireless sensor networks”, ACM Transactions on Sensor Networks, Vol.7, No.4, (2011), pp.29-35.

      [11] Chatterjea S & Havinga P, “A Dynamic data aggregation scheme for Wireless Sensor Networks”, Proc. ProRISC, (2003), pp.56-60.

      [12] Dietrich I & Dressler F, “On the lifetime of wireless sensor networks”, ACM Transactions on Sensor Networks, Vol.5, No.1, (2009).

      [13] Kalpakis K, Dasgupta K & Namjoshi P, “Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks”, Computer Networks, Vol.42, No.6, (2003), pp.697-716.

      [14] Xue Y, Cui Y & Nahrstedt K, “Maximizing lifetime for data aggregation in wireless sensor networks”, ACM/Kluwer Mobile Networks and Applications (MONET) Special Issue on Energy Constraints and Lifetime Performance in Wireless Sensor Networks, (2005), pp.853-864.

      [15] Hong B & Prasanna VK, “Optimizing system lifetime for data gathering in networked sensor systems”, Workshop on Algorithms for Wireless and Ad-hoc Networks, (2004).

      [16] Padmaja P & Marutheswar GV, “Secured Data Aggregation In Wireless Sensor Networks”, International Journal of Applied Engineering Research, Vol.11, No.7, (2016), pp.4740-4745.

      [17] Padmaja P & Marutheswar GV, “Optimization of Wireless Sensor Networks in Secured Data Aggregation”, International Journal of Electrical and Electron is Engineering Research, Vol.7, No.2, (2016), pp.94-100.


 

View

Download

Article ID: 10365
 
DOI: 10.14419/ijet.v7i1.1.10365




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.