A Systematic Approach for the Secure and Dynamic Data Aggregation and Transmission in Wireless Sensor Networks

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 7
Year of Publication : 2016
Authors : K.Niranjan, B.Rama Ganesh

pdf
Citation:
MLA Style:

K.Niranjan, B.Rama Ganesh, "A Systematic Approach for the Secure and Dynamic Data Aggregation and Transmission in Wireless Sensor Networks" SSRG International Journal of Computer Science and Engineering 3.7 (2016): 7-13.

APA Style:

K.Niranjan, B.Rama Ganesh, (2016). A Systematic Approach for the Secure and Dynamic Data Aggregation and Transmission in Wireless Sensor Networks. SSRG International Journal of Computer Science and Engineering 3.7, 7-13.

Abstract:

Remote sensor systems (WSN) are fundamentally dispersed systems or a gathering of sensor hubs which gather data which are utilized to break down physical or natural conditions. WSNs are generally setup in remote and antagonistic territories and work in great conditions. Uses of WSN incorporate natural surroundings checking, modern applications, combat zone reconnaissance, savvy homes and so on. The greater part of them require standard redesigning of programming in sensor hubs through the remote channel for productive administration and working. So it is important to spread information through the remote medium after the hubs are sent. This is known as information scattering or system reconstructing. A decent information scattering convention must be quick, secure, dependable and vitality effective. To accomplish these we can make utilization of system coding procedures which decreases the quantity of retransmissions because of any parcel drops. Be that as it may, network coding expands the possibility of different sorts of system assaults. Likewise to abstain from spreading of malevolent code in the system, every sensor hub needs to verify its got code before engendering it further. So here a novel spread convention is presented taking into account straightforward cryptographic procedures which anticipates contamination and DoS assaults and in the meantime accomplishes quickness utilizing the strategy of system coding.

References:

[1] Mohammad A. Matin, Wireless Sensor Networks: Technology and Protocols: Published by InTech, Croatia, ISBN 978-953-51- 0735-4, 2012.
[2] Salvatore La Malfa, Wireless Sensor Networks, 2010.
[3] Jisha Mary Jose, Jomina John, “Data dissemination protocols in wireless sensor networks-a survey”, IJARCCE, March 2014.
[4] T. Ho and D. Lun. Network Coding: An Introduction. Cambridge University Press, 2008.
[5] Daojing He, Sammy Chan, Shaohua Tang and Mohsen Guizani, “Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks”, IEEE transactions on wireless communications, Vol. 12, No. 9, September 2013.
[6] P. Levis, N. Patel, D. Culler and S. Shenker, “Trickle: a self regulating algorithm for code maintenance and propagation in wireless sensor networks”, in Proc. 2004 NSDI, pp. 15-28.
[7] G. Tolle and D. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in Proc. EWSN, pp. 121–132, 2005.
[8] Lin, K., Levis, P.: “Data discovery and dissemination with dip.” In: Proceedings of the 2008 International Conference on Information Processingin Sensor Networks (IPSN 2008), Washington, DC,USA, IEEE Computer Society (2008) 433-444.
[9] T. Dang, N. Bulusu, W. Feng, and S. Park, “DHV: a code consistency maintenance protocol for multi-hop wireless sensor networks”, in Proc. 2009 EWSN, pp. 327-342.
[10] Hui, J.W., Culler, D.: “The dynamic behaviour of a data dissemination protocol for network programming at scale.” In: Proceedings of the 2nd international conference on Embedded networked sensor systems (Sensys 04), New York, NY, USA, ACM (2004) 81-94.
[11] Nildo dos Santos Ribeiro Junior, Marcos A. M.Vieira1, Luiz F. M. Vieira1 and Om Gnawali, “CodeDrip: Data Dissemination Protocol with Network Coding for Wireless Sensor Networks”, In Proceedings of the 11th European conference onWireless sensor networks (EWSN 2014), Feb. 2014.
[12] Hailun Tan, “Secure multi-hop network programming with multiple one-way key chains”, In: Proceedings of the International conference on Embedded networked sensor systems (Sensys 07), Sydney, Australia, ACM.
[13] YingpeiZeng, Jiannong Cao, Shigeng Zhang, ShanqingGuo, Li Xie, “Pollution Attack: A New Attack Against Localization in Wireless Sensor Networks”, IEEE, WCNC-2009.
[14] I-Hong Hou, Yu-En Tsai, T.F. Abdelzaher, and I. Gupta. Adapcode: Adaptive network coding for code updates in wireless sensor networks. In INFOCOM 2008.The 27th Conference on ComputerCommunications.IEEE, pages 1517–1525, 2008.
[15] AndrewHagedorn, David Starobinski, and Ari Trachtenberg. Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes. In Proceedings of the 7th international conference on Information processing in sensor networks, IPSN ’08, pages 457–466,
[16]Washington, DC, USA, 2008. IEEE Computer Society.[16] S. Katti, H. Rahul,W. Hu, D. Katabi, M.Medard, and J. Crowcroft, “XORs in the air: practical wireless network coding", ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 243-25, 2006.
[17] Philip Levis, Nelson Lee, Matt Welsh, and David Culler. “Tossim: accurate and scalable simulation of entire tinyos applications, In SenSys '03, pages 126-137, New York, NY, USA, 2003. ACM Press.

Key Words:

So here a novel spread convention is presented taking into account straightforward cryptographic procedures which anticipates contamination and DoS assaults and in the meantime accomplishes quickness utilizing the strategy of system coding.