Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for watching and recording the physical situations of the atmosphere and forming the collected data at a central location. Conspiracy attack means the set of nodes to access the illegal data. The data collected from different nodes aggregated at a base station or host computer. Due to imperfect computational power and power possessions, aggregation of information from several sensor nodes finished at the aggregating node is traditional accomplished by humble approaches such as averaging. Though, such aggregation well known to be highly vulnerable to node conceding attacks. Iterative filtering algorithms grasp inordinate promise for such a function. Such algorithms at the similar period aggregate data from several sources and arrange for trust impost of these sources frequently in a form of consistent weight factors assigned to data providing by each source. Data aggregation procedure can increase the robustness and precision of information, which obtained by entire network. In a wormhole attack, the attacker obtains packets at solitary point in the network, straight on them throughout a wired or wireless connection with less expectancy than the system links, and relays them to another point in the network. A distribute wormhole detection algorithm for WSNs, which identify wormholes built on the distortions they create in a network.
Authors and Affiliations
Gottipati Ravi Teja, Maddali M. V. M.
Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor
This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than...
Improve the Productivity of Building Project using Building Information Modelling (BIM) Based 4d Simulation Model
Building Information Modelling (BIM) is an emerging concept in Architecture, Engineering and Construction (AEC) industry. It is not only a tool, it is not only software, it is a new concept which model-based technology...
Impact of Mechanical Properties & Microstructures on Aluminium Alloys (aa6061- aa7075) by using Friction Ftir Welding Process
Recently many reports on Friction Stir Welding (FSW) of various dissimilar systems such as Aluminium alloys AA6061 and AA7075, has been reported. FSW of Aluminium alloys has captured important attention from manufacturi...
Thermal Analysis of Dental Drilling: A Review
Dental drilling is a common practice for dental surgeons. Heat generated during dental drilling causes elevation in temperature of bone being drilled. Heat generation is affected by different factors like: drill diamete...
Static and Structural Analysis of Camshaft
Camshaft is all about opening and closing of valves in a piston engine. In the combustion chamber of a piston engine we have an intake stroke, compression stroke, expansion stroke and an exhaust stroke. In the intake st...