Secure Data Aggregation and Energy Conservation using a Profile Based Scheme

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 4
Year of Publication : 2015
Authors : Anikrishnan V.A, Dr. Revathi Venkataraman

pdf
Citation:
MLA Style:

Anikrishnan V.A, Dr. Revathi Venkataraman, "Secure Data Aggregation and Energy Conservation using a Profile Based Scheme" SSRG International Journal of Computer Science and Engineering 2.4 (2015): 8-12.

APA Style:

Anikrishnan V.A, Dr. Revathi Venkataraman, (2015). Secure Data Aggregation and Energy Conservation using a Profile Based Scheme. SSRG International Journal of Computer Science and Engineering 2.4, 8-12.

Abstract:

A wireless sensor network is a spatially distributed collection of wireless sensors where each sensor is having their own memory and processing power. But these sensors are limited in processing power, energy and storage. Main purpose of using these sensors is that to monitor physical or environmental conditions, such as temperature, sound, pressure and to collectively send to a particular location. Due to limited energy resources in WSN, aggregation of data from multiple sensor nodes done at the aggregating node. Aggregating node or Cluster Head is a node collects all the information and aggregates the data. That data will be forwarded to the base station however such aggregation is known to be highly vulnerable to variety of attacks. Since WSN are usually unattended they are highly vulnerable to many types of attacks. Thus, achieving trustworthiness of data and reputation of sensor nodes is very crucial for WSN. We introduce profile based misbehavior node elimination in wireless sensor network. After selecting the cluster head, nodes will send the data to Cluster head. Cluster head will check all the node’s data whether the data is caused by false information. This is a process which is done by Profile based data collection. CH will be comparing all the sensor’s data with it’s neighboring node. If any sensor’s data show false information, that sensor is considered as malicious node and CH will eliminate that node.

References:

[1] Data Aggregation in Wireless Sensor Network Nandini. S. Patil, Prof. P. R. Patil B.V.. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73. 
[2] Solution of Energy-Efficiency of sensor nodes in Wireless sensor Networks Mohit Saini Assistant Professor, Doon Business School, Dehradun (U.K), India Rakesh Kumar Saini Assistant Professor, Department of MCA,DIT UniversitK. Elissa, IJARCSE Volume 3, Issue 5, May 2013
[3] Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence ofCollusion Attacks Mohsen Rezvani, Student Member, IEEE, Aleksandar Ignjatovic, Elisa Bertino, Fellow, IEEE and Sanjay Jha, Senior Member, IEEE,Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. 
[4] Efficient Clustering for Improving Network Performance in Wireless Sensor Networks Tal Anker1,2 , Danny Bickson1?,Danny Dolev1 and Bracha Hod1 1 The Hebrew University of Jerusalem, Israel {anker, daniel51, dolev, hodb}@cs.huji.ac.il 2 Marvell Semiconductor, CA, USA tala@marvell.com
[5] Energy Saving in Wireless Sensor Networks Zahra Rezaei , Shima Mobininejad Department of Computer Engineering Islamic Azad University, Arak Branch , Arak , Iran
[6] Energy Aware Intra Cluster Routing for Wireless sensor networks A. Akhtar et. al., in 2010 
[7] Energy-Aware Routing in Cluster-Based sensor networks A. M.Younis.et.al in 2002. 
[8] Constraints And Approaches For Distributed Sensor Network Security (Final)1 September 1, 2000 David W. Carman Peter S. Kruus Brian J. Matt

Key Words:

Data aggregation,Secure data aggregation,energy saving.