Detecting malicious nodes using data aggregation protocols in wireless sensor networks
Keywords:Securing Data, Aggregation, Sensor, Energy, Attack, Network Lifetime and Overhead
At present scenario, sensor devices are used in various fields for gathering information so all those data should be secured safely. Securing data is an important role in Wireless Sensor Networks (WSN). WSN is extremely essential for the purpose of reducing the complete redundancy and energy consumption during gathering data among sensor nodes. Optimized data aggregation is needed at cluster head and Base Station (BS) for secured data transmission. Data aggregation is performed in all routers while forwarding data from source to destination node. The complete life time of sensor networks is reducing because of using energy inefficient nodes for the purpose of aggregation. So this paper introduces the optimized methods for securing data (OMSD) which is trust based weights and also completely about the attacks and some methods for secured data transmission.
 Zhu W, Xiang Y & Zhou J, â€œSecure localization with attack detection in wireless sensor networksâ€, International Journal of Information Security, Vol.10, No.3, (2011), pp.155-171.
 Roy S, Conti M, Setia S & Jajodia S, â€œSecure data aggregation in wireless sensor networks: Filtering out the attacker's impactâ€, IEEE Transactions on Information Forensics and Security, Vol.9, No.4, (2014), pp.681-694.
 Kavitha T & Sridharan D, â€œSecurity vulnerabilities in Wireless Sensor Networks: A surveyâ€, Journal of Information Assurance and Security, Vol.5, (2010), pp.31-44.
 Balamurugan P, â€œGeometric Designs for Energy and Delay Computing for Data Gathering in Wireless Sensor Networksâ€, journal of current computer science and technology, Vol.5, No.5, (2015), pp.31-38.
 Sadek AK, Yu W & Liu KJR, â€œOn the energy efficiency of cooperative communications in wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.6, No.1, (2009).
 Jacobs IS & Bean CP, â€œFine particles, thin films and exchange anisotropyâ€, Magnetism, Vol.III, (1963), pp.271â€“350.
 Pradeepa K, Anne WR & Duraisamy S, â€œDesign and implementation issues of clustering in Wireless Sensor Networksâ€, International Journal of Computer Applications, Vol.47, No.11, (2012), pp.23-28.
 Alcaraz C, Lopez J & Roman R, â€œSelecting Key Management Schemes for Wireless Sensor Networks applicationâ€, Journal of Computers and Security, Vol.31, No.8, (2012), pp.956-966.
 Azarderskhsh R & Reyhani A, â€œSecure clustering and symmetric key establishment in heterogeneous wireless sensor networksâ€, Eurasip Journal on Wireless Communications and Networking, (2011), pp.1-12
 Chan AC & Castelluccia C, â€œA security framework for privacy preserving data aggregation in wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.7, No.4, (2011), pp.29-35.
 Chatterjea S & Havinga P, â€œA Dynamic data aggregation scheme for Wireless Sensor Networksâ€, Proc. ProRISC, (2003), pp.56-60.
 Dietrich I & Dressler F, â€œOn the lifetime of wireless sensor networksâ€, ACM Transactions on Sensor Networks, Vol.5, No.1, (2009).
 Kalpakis K, Dasgupta K & Namjoshi P, â€œEfficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networksâ€, Computer Networks, Vol.42, No.6, (2003), pp.697-716.
 Xue Y, Cui Y & Nahrstedt K, â€œMaximizing lifetime for data aggregation in wireless sensor networksâ€, ACM/Kluwer Mobile Networks and Applications (MONET) Special Issue on Energy Constraints and Lifetime Performance in Wireless Sensor Networks, (2005), pp.853-864.
 Hong B & Prasanna VK, â€œOptimizing system lifetime for data gathering in networked sensor systemsâ€, Workshop on Algorithms for Wireless and Ad-hoc Networks, (2004).
 Padmaja P & Marutheswar GV, â€œSecured Data Aggregation In Wireless Sensor Networksâ€, International Journal of Applied Engineering Research, Vol.11, No.7, (2016), pp.4740-4745.
 Padmaja P & Marutheswar GV, â€œOptimization of Wireless Sensor Networks in Secured Data Aggregationâ€, International Journal of Electrical and Electron is Engineering Research, Vol.7, No.2, (2016), pp.94-100.