A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far the most energy consuming task and by reducing its contribution a great amount of energy can be saved. Data aggregation can extend network lifetime and reduce its traffic. However, providing security requirements such as, end-to-end confidentiality or aggregate integrity while performing data aggregation is a challenging task. Here, we propose a scalable method for aggregating encrypted data. The integrity of aggregated data from outsider attacks is checked through a distributed method. Compared to the previous method, our scheme achieves better performance in presence of silent nodes and avoids blind rejection in presence of outsider attacks.
Authors and Affiliations
Mitra Baratchi , Kamal Jamshidi
Synergy between Object Recognition and Image Segmentation
Image segmentation is to partition an image into meaningful regions with respect to a particular application. Object recognition is the task of finding a given object in an image or video sequence. This paper discusses t...
Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications
In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we hav...
Robust TCP: An improvement on TCP protocol
The Transmission Control Protocol (TCP) is the most popular transport layer protocol for the internet. Congestion Control is used to increase the congestion window size if there is additional bandwidth on the network, an...
A Modified Robust Queue Management with Feedback Compensation Technique to Manage the Congestion Control in Wireless Communication Networks
At present there has been a tremendous growth in the computer networks and wireless networks. Due to the enormous growth of voice, audio, video and data applications over the wireless networks, the requirement of congest...
Adaptability of IEEE 802.15.4(Zigbee) Protocol for Wireless Sensor network
The IEEE 802.15.4/Zigbee protocol stack has been considered as a promising technology for Wireless Sensor Networks (WSN). IEEE 802.15.4 Low-Rate Wireless Personal Area Network (WPAN) standard specifies the lower protocol...