A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far the most energy consuming task and by reducing its contribution a great amount of energy can be saved. Data aggregation can extend network lifetime and reduce its traffic. However, providing security requirements such as, end-to-end confidentiality or aggregate integrity while performing data aggregation is a challenging task. Here, we propose a scalable method for aggregating encrypted data. The integrity of aggregated data from outsider attacks is checked through a distributed method. Compared to the previous method, our scheme achieves better performance in presence of silent nodes and avoids blind rejection in presence of outsider attacks.
Authors and Affiliations
Mitra Baratchi , Kamal Jamshidi
Segmentation Based Approach to Dynamic Page Construction from Search Engine Results
The results rendered by the search engines are mostly a linear snippet list. With the prolific increase in the dynamism of web pages there is a need for enhanced result lists from search engines in order to cope-up with...
Healthcare Service Sector: Classifying and Finding Cancer spread pattern in Southern India Using Data Mining Techniques
Data mining has evolved from an experimental analysis to a predicting methodology due to highly precise algorithms and high performance data mining tools. Knowledge discovery in database has been used to predict survivab...
A Study on Scheduling in Grid Environment
Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational demands. In the gr...
Extraction of Flat and Nested Data Records from Web Pages
This paper studies the problem of identification and extraction of flat and nested data records from a given web page. With the explosive growth of information sources available on the World Wide Web, it has become incre...
Optimizing Hidden Markov Model for Failure Prediction– Comparison of Gaine’s optimization and Minimum message length Estimator
Computer systems are prone to failures. Failures are caused by faults that occur in a system. As faults are unknown and cannot be measured, they produce error messages on their detection. The approach presented here is t...