Detecting malicious nodes using data aggregation protocols in wireless sensor networks
-
2017-12-21 https://doi.org/10.14419/ijet.v7i1.1.10365 -
Securing Data, Aggregation, Sensor, Energy, Attack, Network Lifetime and Overhead -
Abstract
At present scenario, sensor devices are used in various fields for gathering information so all those data should be secured safely. Securing data is an important role in Wireless Sensor Networks (WSN). WSN is extremely essential for the purpose of reducing the complete redundancy and energy consumption during gathering data among sensor nodes. Optimized data aggregation is needed at cluster head and Base Station (BS) for secured data transmission. Data aggregation is performed in all routers while forwarding data from source to destination node. The complete life time of sensor networks is reducing because of using energy inefficient nodes for the purpose of aggregation. So this paper introduces the optimized methods for securing data (OMSD) which is trust based weights and also completely about the attacks and some methods for secured data transmission.Â
-
References
[1] Zhu W, Xiang Y & Zhou J, “Secure localization with attack detection in wireless sensor networksâ€, International Journal of Information Security, Vol.10, No.3, (2011), pp.155-171.
[2] Roy S, Conti M, Setia S & Jajodia S, “Secure data aggregation in wireless sensor networks: Filtering out the attacker's impactâ€, IEEE Transactions on Information Forensics and Security, Vol.9, No.4, (2014), pp.681-694.
[3] Kavitha T & Sridharan D, “Security vulnerabilities in Wireless Sensor Networks: A surveyâ€, Journal of Information Assurance and Security, Vol.5, (2010), pp.31-44.
[4] Balamurugan P, “Geometric Designs for Energy and Delay Computing for Data Gathering in Wireless Sensor Networksâ€, journal of current computer science and technology, Vol.5, No.5, (2015), pp.31-38.
[5] Sadek AK, Yu W & Liu KJR, “On the energy efficiency of cooperative communications in wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.6, No.1, (2009).
[6] Jacobs IS & Bean CP, “Fine particles, thin films and exchange anisotropyâ€, Magnetism, Vol.III, (1963), pp.271–350.
[7] Pradeepa K, Anne WR & Duraisamy S, “Design and implementation issues of clustering in Wireless Sensor Networksâ€, International Journal of Computer Applications, Vol.47, No.11, (2012), pp.23-28.
[8] Alcaraz C, Lopez J & Roman R, “Selecting Key Management Schemes for Wireless Sensor Networks applicationâ€, Journal of Computers and Security, Vol.31, No.8, (2012), pp.956-966.
[9] Azarderskhsh R & Reyhani A, “Secure clustering and symmetric key establishment in heterogeneous wireless sensor networksâ€, Eurasip Journal on Wireless Communications and Networking, (2011), pp.1-12
[10] Chan AC & Castelluccia C, “A security framework for privacy preserving data aggregation in wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.7, No.4, (2011), pp.29-35.
[11] Chatterjea S & Havinga P, “A Dynamic data aggregation scheme for Wireless Sensor Networksâ€, Proc. ProRISC, (2003), pp.56-60.
[12] Dietrich I & Dressler F, “On the lifetime of wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.5, No.1, (2009).
[13] Kalpakis K, Dasgupta K & Namjoshi P, “Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networksâ€, Computer Networks, Vol.42, No.6, (2003), pp.697-716.
[14] Xue Y, Cui Y & Nahrstedt K, “Maximizing lifetime for data aggregation in wireless sensor networksâ€, ACM/Kluwer Mobile Networks and Applications (MONET) Special Issue on Energy Constraints and Lifetime Performance in Wireless Sensor Networks, (2005), pp.853-864.
[15] Hong B & Prasanna VK, “Optimizing system lifetime for data gathering in networked sensor systemsâ€, Workshop on Algorithms for Wireless and Ad-hoc Networks, (2004).
[16] Padmaja P & Marutheswar GV, “Secured Data Aggregation In Wireless Sensor Networksâ€, International Journal of Applied Engineering Research, Vol.11, No.7, (2016), pp.4740-4745.
[17] Padmaja P & Marutheswar GV, “Optimization of Wireless Sensor Networks in Secured Data Aggregationâ€, International Journal of Electrical and Electron is Engineering Research, Vol.7, No.2, (2016), pp.94-100.
-
Downloads
-
How to Cite
Balamurugan, P., Devi, M. S., & Sharmila, V. (2017). Detecting malicious nodes using data aggregation protocols in wireless sensor networks. International Journal of Engineering & Technology, 7(1.1), 594-598. https://doi.org/10.14419/ijet.v7i1.1.10365Received date: 2018-03-20
Accepted date: 2018-03-20
Published date: 2017-12-21