SlideShare a Scribd company logo
1 of 6
Download to read offline
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 97 | P a g e
Scalable and Robust Hierarchical Group of Data in Wireless
Sensor Networks
K.VenkataNarayana1,
K.C. Sreedhar2
1
PG Student(CSE), 2
Asst.Professor (CSE)A1, 2
QIS college of Engineering and Technology, Vengamukkala Palem, Ongole, Andhra
Pradesh, India.
Abstract:
In many sensor applications, the data collected from individual nodes is aggregated at a base station or host
computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at
intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not
include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks.
In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being
computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a
survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed
SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure
but also efficient WSN data collection over a series of aggregations.
Keywords – sensor networks, location monitoring.
I. Introduction
A wireless sensor network (WSN) consists of
spatially distributed autonomous sensors to monitor
physical or environmental conditions, such as
temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to
a main location. The more modern networks are bi-
directional, also enabling control of sensor activity.
The development of wireless sensor networks was
motivated by military applications such as battlefield
surveillance; today such networks are used in many
industrial and consumer applications, such as
industrial process monitoring and control, machine
health monitoring, and so on.
Figure 1: Wireless Sensor Network Architecture
II. Data Aggregation in the WSN
Typically, there are three types of nodes in
WSN: normal sensor nodes, aggregators, and a
querier.
The aggregators collect data from a subset of
the network, aggregate the data using a suitable
aggregation function and then transmit the
aggregated result to an upper aggregator or to the
querier who generates the query. The querier is
entrusted with the task of processing the received
sensor data and derives meaningful information
reflecting the events in the target field. It can be the
base station or sometimes an external user who has
permission to interact with the network depending of
the network architecture. Data communication
between sensors, aggregators and the querier
consumes a large portion of the total energy
consumption of the WSN. The WSN in figure 1
contains 16 sensor nodes and uses SUM function to
minimize the energy consumption by reducing the
number of bits reported to the base station. Node 7,
10-16 are normal nodes that are collecting data and
reporting them back to the upper nodes whereas
nodes 1-6, 8, 9 are aggregators that perform sensing
and aggregating at the same time. In this example 16
packets traveled within the network and only one
packet is transmitted to the base station. However,
the number of traveling packets would increase to 50
packets if no data aggregation exists. This number of
packets has been computed for one query.
RESEARCH ARTICLE OPEN ACCESS
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 98 | P a g e
Figure 2: Secure Data Aggregation
A general definition for secure data aggregation is
the efficient delivery of the summary of sensor
readings that are reported to an off-site user in such
a way that ensures these reported readings have not
been altered (Przy datek et al. 2003). They consider
an aggregation application where the querier is
located outside the WSN and the base station acts as
an aggregator. Moreover, a detailed definition of
secure data aggregation is proposed as the process of
obtaining a relative estimate of the sensor readings
with the ability to detect and reject reported data that
is significantly distorted by corrupted nodes or
injected by malicious nodes (Shi &Perrig 2004).
However, rejecting reported data that is injected by
malicious nodes consumes the network resources,
specifically the nodes‟ batteries, since each time the
suspicious packet will be processed at the aggregator
point.The damage caused by malicious nodes or
compromised nodes should be reduced by adding a
self-healing property to the network. This property
helps the network in learning how to handle new
threats through extensive monitoring of network
events, machine learning and network behavior
modeling. Consequently, it is believed that a secure
data aggregation scheme for the WSN should have
the following properties:
• Fair approximation of the sensor readings although
a limited number of nodes are compromised.
• Ability to reduce the size of the data transmitted
through the network.
• Data freshness and integrity are important and
should be included in the scheme. However, the
application type of the WSN affects the scheme
designer‟s decision regarding whether to add the
data confidentiality and availability or not.
• Dynamic response to attack activities by executing
of a self-healing mechanism.
• Dynamic aggregator election/rotation mechanism
to balance the workload at aggregators.
These properties should work together to provide
accurate aggregation results securely without
exhausting the network.
Requirements for Data Aggregation Security
Since WSNs share some properties with the
traditional wireless networks, the data security
requirements in the WSNs are similar to those in
traditional networks (Perrig et al. 2002, Shi
&Perrig2004). However, there are some unique
specifications that can only be found in WSNs, that
require more attention during design process. In this
section the required security properties to strengthen
the security in aggregation schemes will be defined.
• Data Confidentiality
It ensures that information content is never
revealed to anyone who is not authorized to receive
it. It can be divided (in secure data aggregation
schemes) into a hop-by-hop basis and an end-to-end
basis. In the hop-by-hop basis, any aggregator point
needs to decrypt the received encrypted data, apply
some sort of aggregation function, encrypt the
aggregated data, and send it to the upper aggregator
point. This kind of confidentiality implementation is
not practical for the WSN since it requires extra
computation. On the other basis, the aggregator does
not need to decrypt and encrypt data and instead of
this, it needs to apply the aggregation functions
directly on the encrypted data by using
homomorphic encryption (Westhoff et al. 2006).
• Data Integrity
It ensures that the content of a message has not
been altered, either maliciously or by accident,
during transmission process. Confidentiality itself is
not enough since an adversary is still able to change
the data although it knows nothing about it. Suppose
a secure data aggregation scheme focuses only on
data confidentiality. An adversary near the
aggregator point will be able to change the
aggregated result sent to the base station by adding
some fragments or manipulating the packet‟s content
without detection. Moreover, even without the
existence of an adversary, data might be damaged or
lost due to the wireless environment.
• Data Freshness
It ensures that the data are recent and that no old
messages have been replayed to protect data
aggregation schemes against replay attacks. In this
kind of attack, it is not enough that these schemes
only focus on data confidentiality and integrity
because a passive adversary is able to listen to even
encrypted messages transmitted between sensor
nodes can replay them later on and disrupt the data
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 99 | P a g e
aggregation results. More importantly when the
adversary can replay the distributed shared key and
mislead the sensor about the current key.
• Data Availability
It ensures that the network is alive and that data
are accessible. It is highly recommended in the
presence of compromised nodes to achieve network
degradation by eliminating these bad nodes. Once an
attacker gets into the WSN by compromising a node,
the attack will affect the network services and data
availability especially in those parts of the network
where the attack has been launched. Moreover, the
data aggregation security requirements should be
carefully implemented to avoid extra energy
consumption. If no more energy is left, the data will
no longer be available. When the adversary is
getting stronger, it is necessary that a secure data
aggregation scheme contains some of the following
mechanisms to ensure reasonable level of data
availability in the network:
– Self-healing that can diagnose, and react to the
attacker‟s activities especially when he gets into the
network and then start corrective actions based on
defined policies to recover the network or a node.
– Aggregator rotation that rotates the aggregation
duties between honest nodes to balance the energy
consumption in WSN.
• Authentication
There are two types of authentication; entity
authentication, and data authentication. Entity
authentication allows the receiver to verify if the
message is sent by the claimed sender or not.
Therefore, by applying authentication in the WSNs,
an adversary will not be able to participate and inject
data into the network unless it has valid
authentication keys. On the other hand, data
authentication guarantees that the reported data is
the same as the original one. In a secure data
aggregation, both entity and data authentication are
important since entity authentication ensures that
some exchanged data between sensors. For instance,
electing an aggregator point or reporting invalid
aggregated results are authenticated using their
identity while data authentication ensures that raw
data are received at the aggregators at the same time
as they are being sensed.
• Non-repudiation
ensures that a transferred packet has been sent
and received by the person claiming to have sent and
received the packet. In secure aggregation schemes,
once the aggregator sends the aggregation results, it
should not be able to deny sending them. This gives
the base station the opportunity to determine what
causes the changes in the aggregation results.
• Data Accuracy
One major outcome of any aggregation scheme
is to provide an aggregated data as accurately as
possible since it is worth nothing to reduce the
number of bits in the aggregated data but with very
low data accuracy. A trade-off between data
accuracy and aggregated data size should be
considered at the design stage because higher
accuracy requires sending more bits and thus needs
more power.
III. Proposed System
We are interested in protocols that can perform
a sequence of aggregations {A1,A2, . . . ,Aj}in a
WSN with n faulty nodes, and satisfy the following
properties:
Security
 At most n aggregations fail.
 For every successful aggregation A ∈ {A1,A2,
. . .Aj}, with VA being a multi-set of values
contributed by correct nodes in the aggregation
tree TA, and V ′ A a multi-set of arbitrary
values in range M equal in size to the number of
faulty nodes in TA, it holds that
valA= agr(VA + V ‘A)
Figure 3: System Architecture
The system operates in three stages. First, data
aggregation and manipulation detection are
performed by SHIA [2], due to its efficiency and
effectiveness. If successful, the system proceeds to
the next aggregation. Otherwise, at a second stage,
the Adversary Localizer Scheme (ALS) is launched:
the ALS.I phase localizes, i.e., marks, nodes that
disrupted the aggregation value, and ALS.II marks
nodes that disrupted the acknowledgement
collection during stage one (SHIA). At the third
stage, the Aggregation Tree Reconstruction (ATR)
protocol is invoked, which constructs a new
aggregation tree excluding the marked nodes.
Gradually, after a series of failed aggregations, all
the faulty nodes will be excluded, allowing
undisrupted in-network aggregation and thus
efficient operation.
We use the following cryptographic primitives:
H, a collision-resistant hash function, and MAC, a
Message Authentication Code. AuthK(m) denotes
message m authenticated using the symmetric key
K, e.g. <m,MAC(m)K>.
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 100 |
P a g e
Stage One: SHIA
The SHIA algorithm focuses on the sum
aggregate and consists of three phases: query
dissemination, aggregate commit and result
checking. The base station (BS) initiates the
aggregation, generating a nonce N that identifies the
aggregation session and broadcasting it to the
network, as part of a query (along with other
possibly useful data) in an authenticated manner.
The aggregate-commit phase, every node
calculates a label, based on the labels of its children
and its own value, and sends it to its parent node.
The label is a <count, value, commitment> tuple,
with count the number of nodes in the subtree rooted
at the node, value the sum of all the nodes values in
the subtree, and commitment the cryptographic
commitment tree over the data values and the
aggregation process in the subtree.
In the result-checking phase, the BS
disseminates, using an authenticated broadcast, N
and the <c, v, h> label. Every node uses this label to
verify if its value was aggregated correctly.
Fact 1: If a node and its child both follow the SHIA
protocol, either they both acknowledge or neither
do.
A node s acknowledges by releasing an
authentication code (ack): MACKs (NkOK), where
OK is a unique message identifier and Ks is the key
shared between node s and the BS. Leaf nodes send
their ack while intermediate nodes wait for acks
from all their children, compute the XOR of those
acks with their own ack, and forward the resultant
aggregated ack to their parent.
Once the BS has received the aggregated ack
message Ab from b, it can verify whether all nodes
acknowledged the aggregation value: It calculates
the ackof every sensor (using the key shared with
the node), XOR‟es them and compares the result to
Ab. In case of equality, all nodes acknowledged, and
the BS declares the aggregation successful.
Otherwise, our ALS protocol is triggered.
Stage Two: Adversary Localizer Scheme, Part I
ALS.I marks nodes that misbehaved in the
aggregate commit phase of SHIA or the
dissemination of off-path values. ALS.I consists of
two phases:
Hierarchical Collection of Confirmations: The BS
initiates this phase by sending an authenticated
broadcast containing N and informing all nodes that
ALS.I is taking place. If a node had not
acknowledged the result (as determined by SHIA), it
does not respond. Otherwise, a leaf node s sends a
confirmation Ms = AuthKs(N) to its parent. An
internal node t waits for its children, u1, u2, ...,uk
(the order is based on their identifiers) to send their
confirmations. Then, t sends up the following
confirmation: Mt = AuthKt(N,Mu1 ,Mu2 , ...,Muk ).
If t does not receive any messages from its rth child,
Mur is replaced with a predefined message Mnr,
indicating “no message received from this child”.
Figure 4 ALS.I: Hierarchical Collection of
Confirmations
Recursive Processing of Confirmations: The above
procedure results in message Mb reaching the BS. If
no message is received, then b, the single child of
the BS, is marked. Otherwise, the message is
processed in a recursive manner. As the aggregation
tree is known to the BS, it knows that Mb should be
authenticated using Kb. If it is, and the message
begins with N, and the proper number of child
messages (equal to the number of b‟s children) can
be extracted from it, the message is regarded as
legitimate, and the recursive procedure is applied to
each child message. Otherwise the message is
regarded as illegitimate. Note that the special Mnr
message is also regarded as illegitimate. In that case,
the BS marks the node to which this message
corresponds to and its parent (in the farther recursive
executions, when the BS is not the parent); the
recursive execution stops. The recursive procedure
also stops when it reaches a leaf node.
Stage Two: Adversary Localizer Scheme, Part II
It is possible that ALS.I does not localize any
faulty nodes, even though SHIA declared a failed
aggregation. This can happen when all correct nodes
acknowledge, which implies a correctly done
aggregation but a faulty node disrupting the
aggregation of acks. On the positive side, in such a
situation the BS can be sure of a correct aggregation
result. However, the not removed faulty node could
disrupt a subsequent aggregation, something
unacceptable according to our problem statement.
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 101 |
P a g e
Figure 5:ALS.I: Recursive Processing of
Confirmations
The ALS.II scheme addresses this problem. To
implement ALS.II, we need to slightly modify
SHIA, making every node store the ack messages it
received from its children. ALS.II delivers them to
the BS, using the same mechanism as the
Hierarchical Collection of Confirmations in ALS.I.
Then, the BS identifies inconsistencies, through an
algorithm based on Recursive Processing of
Confirmations.
Hierarchical Collection of acks
The BS initiates this phase by broadcasting an
authenticated message containing N, informing the
nodes that ALS.II is taking place. A leaf node s does
not send anything. An internal node t, with non-leaf
children u1, u2, ..., uq, sends up Mt =
AuthKu(N,Mu1 ,Mu2 , ...,Muq ,Au1 , ...,Auq ),
where Mu1 ,Mu2 , ...,Muq are the messages t
received from its children in this phase, and Au1
,Au2 , ...,Auq are ackmessages that it received from
them in the SHIA result-check phase.
Recursive Processing and Ack Analysis
Upon receiving Mb from its child b, the BS
recursively processes it to find the source(s) of
discrepancy. As in ALS.I, if the message of node t
illegitimate, meaning that it is not authenticated with
Kb, it does not begin with N, or the proper number
(of nonleaf children) of child messages and
ackmessages cannot be extracted from it, both t and
its parent are marked. There are only two significant
differences from ALS.I. First, if for some node u the
ackmessage Au equals Au, then the corresponding
child message Mu is not further processed. Second,
the BS is looking for ack inconsistencies, which
have two variations: (i) for node t which has a leaf
node s as a child, As is different from MACKs
(NkOK), the ackof node s. (ii) for node t which has a
child s, which has the children u1, ..., uq, the value
As is not equal to MACKs (NkOK) ⊗(NAui ) (Fig.
4b). If an ack inconsistency is detected, both t and s
are marked, but the recursive procedure is continued
(if possible).
Figure 6: ALS.II: ack inconsistencies
Stage Three: Aggregation Tree Reconstruction
The Aggregation Tree (Re) Construction (ATR)
protocol, in addition to the tree construction, allows
the BS to exclude nodes in BL, a black list, from the
new tree T′A and provides the BS with the
knowledge of T‟A. The primary requirement for
ATR is that its output, T‟A, is identical to the parts
of the tree nodes know. This way, a faulty node is
not be able to mislead the ALS protocols marking a
correct node.
The BS initiates ATR, via a neighboring node b, by
sending a tree establishment (TE) message <N,BL,
n>, protected by a network-wide broadcast
authenticator AuthBcast.
As the TE message is flooded, it is authenticated
in a hop by hop manner by data-link broadcast
authentication. Each v maintains s from which it
first receives a fresh TE as its parent, and confirms
to s that it is its child. After s hears from its k
children, namely v1, . . . ,vk, it sends its responseto
the BS: AuthKs (N, s, (v1, . . . , vk)), or AuthKs (N,
s), if it is a leaf. The responses are propagated
upwards to the BS. After sending its own response,
the node acts as a relay for the responses of its
children and up to n responses or until the response
collection concludes; these constraints are added to
keep the cost bounded, but might result in loss of
legitimate responses. A faulty node cannot create
any inconsistency between the tree at BS and the
nodes if responses are lost or dropped. Even if the
faulty node eliminated a subtree, it would at most
prevent aggregation from a part of the network, but
no correct node would be blacklisted and thus
permanently excluded.
Highly Resilient ATR
To ensure that the new tree ATR covers all
nodes, we sketch here a different protocol, whose
initial phase must run before any aggregation takes
place. After each node s ran a secure neighbor
discovery, it floods its neighbor list (NLs) across the
network; a fresh NLs is relayed by each node only
once. Upon receipt of the neighbor lists from all
nodes, the BS constructs the network connectivity
graph, rejecting links not announced by both
neighbors. The BS then calculates locally TA. At the
end of this initial phase, as well as after any
K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102
www.ijera.com 102 |
P a g e
subsequent reconstruction, the BS simply distributes
the newly calculated aggregation tree across the
network. It suffices that each node relays the
message containing TA once at most.
We emphasize that the costly NL collection is
performed in general only once, at the initial phase
of ATR. To ensure resilience to DoS attacks, nodes
need to authenticate each NL they relay. Otherwise,
faulty nodes could flood the network with bogus
neighbor lists. To achieve this, public key
cryptography is needed; recent implementations and
references within, attest to its feasibility for WSNs.
Each responding s signs its NLs. The scheme cannot
be exploited by clogging/energy consumption DoS
attacks: Correct nodes immediately ignore messages
coming from a neighbor that forwarded one invalid-
signed NL, as the forwarder should have checked its
validity already.
IV.Conclusion
Our scheme builds on the Secure Hierarchical
In-Network Aggregation, in order to achieve not
only secure but also efficient WSN data collection
over a series of aggregations. We have described a
basic version of our scheme, sufficient to satisfy the
stated specification. However, there are a number of
enhancements and extensions that could be
integrated in the proposed system. For example, our
scheme could interoperate the improved SHIA
approach, yielding a more efficient, O(log2 n),
successful aggregation.
References
[1] Castelluccia, C., Mykletun, E. &Tsudik, G.
(2005), Efficient Aggregation of Encrypted
Data in Wireless Sensor Networks., in
„MobiQuitous‟, IEEE Computer Society, pp.
109–117.
[2] Chan, H., Perrig, A. & Song, D. (2006),
Secure hierarchical in-network aggregation
in sensor networks., in A. Juels, R. N.
Wright & S. D. C. di Vimercati, eds, „ACM
Conference on Computer and
Communications Security‟, ACM, pp. 278–
287.
[3] Corporation, C. (2006), „Mica2 datasheet‟.
Reviewed 10th of October 2007,
http://www.xbow.com/Products/Product_pdf
_files/Wireless_pdf/MICA2_Datasheet.pdf.
[4] Domingo-Ferrer, J. (2002), A provably
secure additive and multiplicative privacy
homomorphism., in A. H. Chan & V. D.
Gligor, eds, „ISC‟, Vol. 2433 of Lecture
Notes in Computer Science, Springer, pp.
471–483.
[5] Du, W., Deng, J., Han, Y. S. &Varshney, P.
(2003), A witness-based approach for data
fusion assurance in wireless sensor
networks, in „IEEE Global Communications
Conference (GLOBECOM)‟, Vol. 3, pp.
1435– 1439.
[6] Grigoriev, D. &Ponomarenko, I. V. (2003),
„Homomorphic public-key cryptosystems
over groups and rings‟, CoRR
cs.CR/0309010.
[7] Guimar˜aes, G., Souto, E., Sadok, D. F. H.
&Kelner, J. (2005), Evaluation of security
mechanisms in wireless sensor networks., in
„ICW/ICHSN/ICMCS/SENET‟, IEEE
Computer Society, pp. 428–433.
AUTHOR’S PROFILE
K. VENKATA NARAYANA
Pursuing M.Tech (CSE), QIS
College of Engineering and
Technology VengamukkalaPalem,
Ongole, Prakasam Dist, Andhra
Pradesh, India. My Research
interest includes Computer
Networks and Mobile Computing.
K.C. SREEDHAR received
M.Tech (CSE) From JNTU-HYD.
He is currently working as Asst.
Professor in QIS College of
Engineering and Technology, in
the Department of Computer
Science and Engineering, Ongole,
A.P. His Research interests
include Data Mining and
Computer Networks.

More Related Content

What's hot

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksijsptm
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET Journal
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networksijtsrd
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET Journal
 

What's hot (18)

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
A0320105
A0320105A0320105
A0320105
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 

Viewers also liked

Geanimeerd leren met scratch zonder filmpjes
Geanimeerd leren met scratch zonder filmpjesGeanimeerd leren met scratch zonder filmpjes
Geanimeerd leren met scratch zonder filmpjesDigitaal Laboratorium
 
Положение о структурных подразделениях учреждения
Положение о структурных подразделениях учрежденияПоложение о структурных подразделениях учреждения
Положение о структурных подразделениях учрежденияpatriot29
 
Planning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringPlanning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringIJERA Editor
 
Microstrip Antenna for ISM Band (2.4GHz) Applications-A review
Microstrip Antenna for ISM Band (2.4GHz) Applications-A reviewMicrostrip Antenna for ISM Band (2.4GHz) Applications-A review
Microstrip Antenna for ISM Band (2.4GHz) Applications-A reviewIJERA Editor
 
Tender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsTender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsIJERA Editor
 
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...IJERA Editor
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierIJERA Editor
 
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGA
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGAVoice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGA
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGAIJERA Editor
 
Pengantar Bisnis
Pengantar BisnisPengantar Bisnis
Pengantar Bisnisha8ib
 
το σχολείο που υπηρετώ
το σχολείο που υπηρετώτο σχολείο που υπηρετώ
το σχολείο που υπηρετώt439468k
 
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLAB
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLABProton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLAB
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLABIJERA Editor
 
22 січня День Соборності України
22 січня День Соборності України22 січня День Соборності України
22 січня День Соборності УкраїниdndzNVK36
 
Pengantar Manajemen
Pengantar ManajemenPengantar Manajemen
Pengantar Manajemenha8ib
 

Viewers also liked (15)

Geanimeerd leren met scratch zonder filmpjes
Geanimeerd leren met scratch zonder filmpjesGeanimeerd leren met scratch zonder filmpjes
Geanimeerd leren met scratch zonder filmpjes
 
downsize logo - Vector
downsize logo - Vectordownsize logo - Vector
downsize logo - Vector
 
Положение о структурных подразделениях учреждения
Положение о структурных подразделениях учрежденияПоложение о структурных подразделениях учреждения
Положение о структурных подразделениях учреждения
 
Planning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringPlanning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil Engineering
 
Microstrip Antenna for ISM Band (2.4GHz) Applications-A review
Microstrip Antenna for ISM Band (2.4GHz) Applications-A reviewMicrostrip Antenna for ISM Band (2.4GHz) Applications-A review
Microstrip Antenna for ISM Band (2.4GHz) Applications-A review
 
Tender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsTender and Bidding in Construction Projects
Tender and Bidding in Construction Projects
 
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...
Study of Simulated Temperature of Butt Joint during Friction Stir Welding Of ...
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic Multiplier
 
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGA
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGAVoice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGA
Voice Activity Detector of Wake-Up-Word Speech Recognition System Design on FPGA
 
Pengantar Bisnis
Pengantar BisnisPengantar Bisnis
Pengantar Bisnis
 
на сайт 7а класс
на сайт 7а классна сайт 7а класс
на сайт 7а класс
 
το σχολείο που υπηρετώ
το σχολείο που υπηρετώτο σχολείο που υπηρετώ
το σχολείο που υπηρετώ
 
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLAB
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLABProton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLAB
Proton Exchange Membrane Fuel Cell Design and Dynamic Modeling in MATLAB
 
22 січня День Соборності України
22 січня День Соборності України22 січня День Соборності України
22 січня День Соборності України
 
Pengantar Manajemen
Pengantar ManajemenPengantar Manajemen
Pengantar Manajemen
 

Similar to Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks

Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...IJECEIAES
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 

Similar to Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks (20)

Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
50120140505014
5012014050501450120140505014
50120140505014
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
S04404116120
S04404116120S04404116120
S04404116120
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
wcn.pptx
wcn.pptxwcn.pptx
wcn.pptx
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks

  • 1. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 97 | P a g e Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks K.VenkataNarayana1, K.C. Sreedhar2 1 PG Student(CSE), 2 Asst.Professor (CSE)A1, 2 QIS college of Engineering and Technology, Vengamukkala Palem, Ongole, Andhra Pradesh, India. Abstract: In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks. In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations. Keywords – sensor networks, location monitoring. I. Introduction A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi- directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Figure 1: Wireless Sensor Network Architecture II. Data Aggregation in the WSN Typically, there are three types of nodes in WSN: normal sensor nodes, aggregators, and a querier. The aggregators collect data from a subset of the network, aggregate the data using a suitable aggregation function and then transmit the aggregated result to an upper aggregator or to the querier who generates the query. The querier is entrusted with the task of processing the received sensor data and derives meaningful information reflecting the events in the target field. It can be the base station or sometimes an external user who has permission to interact with the network depending of the network architecture. Data communication between sensors, aggregators and the querier consumes a large portion of the total energy consumption of the WSN. The WSN in figure 1 contains 16 sensor nodes and uses SUM function to minimize the energy consumption by reducing the number of bits reported to the base station. Node 7, 10-16 are normal nodes that are collecting data and reporting them back to the upper nodes whereas nodes 1-6, 8, 9 are aggregators that perform sensing and aggregating at the same time. In this example 16 packets traveled within the network and only one packet is transmitted to the base station. However, the number of traveling packets would increase to 50 packets if no data aggregation exists. This number of packets has been computed for one query. RESEARCH ARTICLE OPEN ACCESS
  • 2. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 98 | P a g e Figure 2: Secure Data Aggregation A general definition for secure data aggregation is the efficient delivery of the summary of sensor readings that are reported to an off-site user in such a way that ensures these reported readings have not been altered (Przy datek et al. 2003). They consider an aggregation application where the querier is located outside the WSN and the base station acts as an aggregator. Moreover, a detailed definition of secure data aggregation is proposed as the process of obtaining a relative estimate of the sensor readings with the ability to detect and reject reported data that is significantly distorted by corrupted nodes or injected by malicious nodes (Shi &Perrig 2004). However, rejecting reported data that is injected by malicious nodes consumes the network resources, specifically the nodes‟ batteries, since each time the suspicious packet will be processed at the aggregator point.The damage caused by malicious nodes or compromised nodes should be reduced by adding a self-healing property to the network. This property helps the network in learning how to handle new threats through extensive monitoring of network events, machine learning and network behavior modeling. Consequently, it is believed that a secure data aggregation scheme for the WSN should have the following properties: • Fair approximation of the sensor readings although a limited number of nodes are compromised. • Ability to reduce the size of the data transmitted through the network. • Data freshness and integrity are important and should be included in the scheme. However, the application type of the WSN affects the scheme designer‟s decision regarding whether to add the data confidentiality and availability or not. • Dynamic response to attack activities by executing of a self-healing mechanism. • Dynamic aggregator election/rotation mechanism to balance the workload at aggregators. These properties should work together to provide accurate aggregation results securely without exhausting the network. Requirements for Data Aggregation Security Since WSNs share some properties with the traditional wireless networks, the data security requirements in the WSNs are similar to those in traditional networks (Perrig et al. 2002, Shi &Perrig2004). However, there are some unique specifications that can only be found in WSNs, that require more attention during design process. In this section the required security properties to strengthen the security in aggregation schemes will be defined. • Data Confidentiality It ensures that information content is never revealed to anyone who is not authorized to receive it. It can be divided (in secure data aggregation schemes) into a hop-by-hop basis and an end-to-end basis. In the hop-by-hop basis, any aggregator point needs to decrypt the received encrypted data, apply some sort of aggregation function, encrypt the aggregated data, and send it to the upper aggregator point. This kind of confidentiality implementation is not practical for the WSN since it requires extra computation. On the other basis, the aggregator does not need to decrypt and encrypt data and instead of this, it needs to apply the aggregation functions directly on the encrypted data by using homomorphic encryption (Westhoff et al. 2006). • Data Integrity It ensures that the content of a message has not been altered, either maliciously or by accident, during transmission process. Confidentiality itself is not enough since an adversary is still able to change the data although it knows nothing about it. Suppose a secure data aggregation scheme focuses only on data confidentiality. An adversary near the aggregator point will be able to change the aggregated result sent to the base station by adding some fragments or manipulating the packet‟s content without detection. Moreover, even without the existence of an adversary, data might be damaged or lost due to the wireless environment. • Data Freshness It ensures that the data are recent and that no old messages have been replayed to protect data aggregation schemes against replay attacks. In this kind of attack, it is not enough that these schemes only focus on data confidentiality and integrity because a passive adversary is able to listen to even encrypted messages transmitted between sensor nodes can replay them later on and disrupt the data
  • 3. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 99 | P a g e aggregation results. More importantly when the adversary can replay the distributed shared key and mislead the sensor about the current key. • Data Availability It ensures that the network is alive and that data are accessible. It is highly recommended in the presence of compromised nodes to achieve network degradation by eliminating these bad nodes. Once an attacker gets into the WSN by compromising a node, the attack will affect the network services and data availability especially in those parts of the network where the attack has been launched. Moreover, the data aggregation security requirements should be carefully implemented to avoid extra energy consumption. If no more energy is left, the data will no longer be available. When the adversary is getting stronger, it is necessary that a secure data aggregation scheme contains some of the following mechanisms to ensure reasonable level of data availability in the network: – Self-healing that can diagnose, and react to the attacker‟s activities especially when he gets into the network and then start corrective actions based on defined policies to recover the network or a node. – Aggregator rotation that rotates the aggregation duties between honest nodes to balance the energy consumption in WSN. • Authentication There are two types of authentication; entity authentication, and data authentication. Entity authentication allows the receiver to verify if the message is sent by the claimed sender or not. Therefore, by applying authentication in the WSNs, an adversary will not be able to participate and inject data into the network unless it has valid authentication keys. On the other hand, data authentication guarantees that the reported data is the same as the original one. In a secure data aggregation, both entity and data authentication are important since entity authentication ensures that some exchanged data between sensors. For instance, electing an aggregator point or reporting invalid aggregated results are authenticated using their identity while data authentication ensures that raw data are received at the aggregators at the same time as they are being sensed. • Non-repudiation ensures that a transferred packet has been sent and received by the person claiming to have sent and received the packet. In secure aggregation schemes, once the aggregator sends the aggregation results, it should not be able to deny sending them. This gives the base station the opportunity to determine what causes the changes in the aggregation results. • Data Accuracy One major outcome of any aggregation scheme is to provide an aggregated data as accurately as possible since it is worth nothing to reduce the number of bits in the aggregated data but with very low data accuracy. A trade-off between data accuracy and aggregated data size should be considered at the design stage because higher accuracy requires sending more bits and thus needs more power. III. Proposed System We are interested in protocols that can perform a sequence of aggregations {A1,A2, . . . ,Aj}in a WSN with n faulty nodes, and satisfy the following properties: Security  At most n aggregations fail.  For every successful aggregation A ∈ {A1,A2, . . .Aj}, with VA being a multi-set of values contributed by correct nodes in the aggregation tree TA, and V ′ A a multi-set of arbitrary values in range M equal in size to the number of faulty nodes in TA, it holds that valA= agr(VA + V ‘A) Figure 3: System Architecture The system operates in three stages. First, data aggregation and manipulation detection are performed by SHIA [2], due to its efficiency and effectiveness. If successful, the system proceeds to the next aggregation. Otherwise, at a second stage, the Adversary Localizer Scheme (ALS) is launched: the ALS.I phase localizes, i.e., marks, nodes that disrupted the aggregation value, and ALS.II marks nodes that disrupted the acknowledgement collection during stage one (SHIA). At the third stage, the Aggregation Tree Reconstruction (ATR) protocol is invoked, which constructs a new aggregation tree excluding the marked nodes. Gradually, after a series of failed aggregations, all the faulty nodes will be excluded, allowing undisrupted in-network aggregation and thus efficient operation. We use the following cryptographic primitives: H, a collision-resistant hash function, and MAC, a Message Authentication Code. AuthK(m) denotes message m authenticated using the symmetric key K, e.g. <m,MAC(m)K>.
  • 4. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 100 | P a g e Stage One: SHIA The SHIA algorithm focuses on the sum aggregate and consists of three phases: query dissemination, aggregate commit and result checking. The base station (BS) initiates the aggregation, generating a nonce N that identifies the aggregation session and broadcasting it to the network, as part of a query (along with other possibly useful data) in an authenticated manner. The aggregate-commit phase, every node calculates a label, based on the labels of its children and its own value, and sends it to its parent node. The label is a <count, value, commitment> tuple, with count the number of nodes in the subtree rooted at the node, value the sum of all the nodes values in the subtree, and commitment the cryptographic commitment tree over the data values and the aggregation process in the subtree. In the result-checking phase, the BS disseminates, using an authenticated broadcast, N and the <c, v, h> label. Every node uses this label to verify if its value was aggregated correctly. Fact 1: If a node and its child both follow the SHIA protocol, either they both acknowledge or neither do. A node s acknowledges by releasing an authentication code (ack): MACKs (NkOK), where OK is a unique message identifier and Ks is the key shared between node s and the BS. Leaf nodes send their ack while intermediate nodes wait for acks from all their children, compute the XOR of those acks with their own ack, and forward the resultant aggregated ack to their parent. Once the BS has received the aggregated ack message Ab from b, it can verify whether all nodes acknowledged the aggregation value: It calculates the ackof every sensor (using the key shared with the node), XOR‟es them and compares the result to Ab. In case of equality, all nodes acknowledged, and the BS declares the aggregation successful. Otherwise, our ALS protocol is triggered. Stage Two: Adversary Localizer Scheme, Part I ALS.I marks nodes that misbehaved in the aggregate commit phase of SHIA or the dissemination of off-path values. ALS.I consists of two phases: Hierarchical Collection of Confirmations: The BS initiates this phase by sending an authenticated broadcast containing N and informing all nodes that ALS.I is taking place. If a node had not acknowledged the result (as determined by SHIA), it does not respond. Otherwise, a leaf node s sends a confirmation Ms = AuthKs(N) to its parent. An internal node t waits for its children, u1, u2, ...,uk (the order is based on their identifiers) to send their confirmations. Then, t sends up the following confirmation: Mt = AuthKt(N,Mu1 ,Mu2 , ...,Muk ). If t does not receive any messages from its rth child, Mur is replaced with a predefined message Mnr, indicating “no message received from this child”. Figure 4 ALS.I: Hierarchical Collection of Confirmations Recursive Processing of Confirmations: The above procedure results in message Mb reaching the BS. If no message is received, then b, the single child of the BS, is marked. Otherwise, the message is processed in a recursive manner. As the aggregation tree is known to the BS, it knows that Mb should be authenticated using Kb. If it is, and the message begins with N, and the proper number of child messages (equal to the number of b‟s children) can be extracted from it, the message is regarded as legitimate, and the recursive procedure is applied to each child message. Otherwise the message is regarded as illegitimate. Note that the special Mnr message is also regarded as illegitimate. In that case, the BS marks the node to which this message corresponds to and its parent (in the farther recursive executions, when the BS is not the parent); the recursive execution stops. The recursive procedure also stops when it reaches a leaf node. Stage Two: Adversary Localizer Scheme, Part II It is possible that ALS.I does not localize any faulty nodes, even though SHIA declared a failed aggregation. This can happen when all correct nodes acknowledge, which implies a correctly done aggregation but a faulty node disrupting the aggregation of acks. On the positive side, in such a situation the BS can be sure of a correct aggregation result. However, the not removed faulty node could disrupt a subsequent aggregation, something unacceptable according to our problem statement.
  • 5. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 101 | P a g e Figure 5:ALS.I: Recursive Processing of Confirmations The ALS.II scheme addresses this problem. To implement ALS.II, we need to slightly modify SHIA, making every node store the ack messages it received from its children. ALS.II delivers them to the BS, using the same mechanism as the Hierarchical Collection of Confirmations in ALS.I. Then, the BS identifies inconsistencies, through an algorithm based on Recursive Processing of Confirmations. Hierarchical Collection of acks The BS initiates this phase by broadcasting an authenticated message containing N, informing the nodes that ALS.II is taking place. A leaf node s does not send anything. An internal node t, with non-leaf children u1, u2, ..., uq, sends up Mt = AuthKu(N,Mu1 ,Mu2 , ...,Muq ,Au1 , ...,Auq ), where Mu1 ,Mu2 , ...,Muq are the messages t received from its children in this phase, and Au1 ,Au2 , ...,Auq are ackmessages that it received from them in the SHIA result-check phase. Recursive Processing and Ack Analysis Upon receiving Mb from its child b, the BS recursively processes it to find the source(s) of discrepancy. As in ALS.I, if the message of node t illegitimate, meaning that it is not authenticated with Kb, it does not begin with N, or the proper number (of nonleaf children) of child messages and ackmessages cannot be extracted from it, both t and its parent are marked. There are only two significant differences from ALS.I. First, if for some node u the ackmessage Au equals Au, then the corresponding child message Mu is not further processed. Second, the BS is looking for ack inconsistencies, which have two variations: (i) for node t which has a leaf node s as a child, As is different from MACKs (NkOK), the ackof node s. (ii) for node t which has a child s, which has the children u1, ..., uq, the value As is not equal to MACKs (NkOK) ⊗(NAui ) (Fig. 4b). If an ack inconsistency is detected, both t and s are marked, but the recursive procedure is continued (if possible). Figure 6: ALS.II: ack inconsistencies Stage Three: Aggregation Tree Reconstruction The Aggregation Tree (Re) Construction (ATR) protocol, in addition to the tree construction, allows the BS to exclude nodes in BL, a black list, from the new tree T′A and provides the BS with the knowledge of T‟A. The primary requirement for ATR is that its output, T‟A, is identical to the parts of the tree nodes know. This way, a faulty node is not be able to mislead the ALS protocols marking a correct node. The BS initiates ATR, via a neighboring node b, by sending a tree establishment (TE) message <N,BL, n>, protected by a network-wide broadcast authenticator AuthBcast. As the TE message is flooded, it is authenticated in a hop by hop manner by data-link broadcast authentication. Each v maintains s from which it first receives a fresh TE as its parent, and confirms to s that it is its child. After s hears from its k children, namely v1, . . . ,vk, it sends its responseto the BS: AuthKs (N, s, (v1, . . . , vk)), or AuthKs (N, s), if it is a leaf. The responses are propagated upwards to the BS. After sending its own response, the node acts as a relay for the responses of its children and up to n responses or until the response collection concludes; these constraints are added to keep the cost bounded, but might result in loss of legitimate responses. A faulty node cannot create any inconsistency between the tree at BS and the nodes if responses are lost or dropped. Even if the faulty node eliminated a subtree, it would at most prevent aggregation from a part of the network, but no correct node would be blacklisted and thus permanently excluded. Highly Resilient ATR To ensure that the new tree ATR covers all nodes, we sketch here a different protocol, whose initial phase must run before any aggregation takes place. After each node s ran a secure neighbor discovery, it floods its neighbor list (NLs) across the network; a fresh NLs is relayed by each node only once. Upon receipt of the neighbor lists from all nodes, the BS constructs the network connectivity graph, rejecting links not announced by both neighbors. The BS then calculates locally TA. At the end of this initial phase, as well as after any
  • 6. K.VenkataNarayana Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.97-102 www.ijera.com 102 | P a g e subsequent reconstruction, the BS simply distributes the newly calculated aggregation tree across the network. It suffices that each node relays the message containing TA once at most. We emphasize that the costly NL collection is performed in general only once, at the initial phase of ATR. To ensure resilience to DoS attacks, nodes need to authenticate each NL they relay. Otherwise, faulty nodes could flood the network with bogus neighbor lists. To achieve this, public key cryptography is needed; recent implementations and references within, attest to its feasibility for WSNs. Each responding s signs its NLs. The scheme cannot be exploited by clogging/energy consumption DoS attacks: Correct nodes immediately ignore messages coming from a neighbor that forwarded one invalid- signed NL, as the forwarder should have checked its validity already. IV.Conclusion Our scheme builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations. We have described a basic version of our scheme, sufficient to satisfy the stated specification. However, there are a number of enhancements and extensions that could be integrated in the proposed system. For example, our scheme could interoperate the improved SHIA approach, yielding a more efficient, O(log2 n), successful aggregation. References [1] Castelluccia, C., Mykletun, E. &Tsudik, G. (2005), Efficient Aggregation of Encrypted Data in Wireless Sensor Networks., in „MobiQuitous‟, IEEE Computer Society, pp. 109–117. [2] Chan, H., Perrig, A. & Song, D. (2006), Secure hierarchical in-network aggregation in sensor networks., in A. Juels, R. N. Wright & S. D. C. di Vimercati, eds, „ACM Conference on Computer and Communications Security‟, ACM, pp. 278– 287. [3] Corporation, C. (2006), „Mica2 datasheet‟. Reviewed 10th of October 2007, http://www.xbow.com/Products/Product_pdf _files/Wireless_pdf/MICA2_Datasheet.pdf. [4] Domingo-Ferrer, J. (2002), A provably secure additive and multiplicative privacy homomorphism., in A. H. Chan & V. D. Gligor, eds, „ISC‟, Vol. 2433 of Lecture Notes in Computer Science, Springer, pp. 471–483. [5] Du, W., Deng, J., Han, Y. S. &Varshney, P. (2003), A witness-based approach for data fusion assurance in wireless sensor networks, in „IEEE Global Communications Conference (GLOBECOM)‟, Vol. 3, pp. 1435– 1439. [6] Grigoriev, D. &Ponomarenko, I. V. (2003), „Homomorphic public-key cryptosystems over groups and rings‟, CoRR cs.CR/0309010. [7] Guimar˜aes, G., Souto, E., Sadok, D. F. H. &Kelner, J. (2005), Evaluation of security mechanisms in wireless sensor networks., in „ICW/ICHSN/ICMCS/SENET‟, IEEE Computer Society, pp. 428–433. AUTHOR’S PROFILE K. VENKATA NARAYANA Pursuing M.Tech (CSE), QIS College of Engineering and Technology VengamukkalaPalem, Ongole, Prakasam Dist, Andhra Pradesh, India. My Research interest includes Computer Networks and Mobile Computing. K.C. SREEDHAR received M.Tech (CSE) From JNTU-HYD. He is currently working as Asst. Professor in QIS College of Engineering and Technology, in the Department of Computer Science and Engineering, Ongole, A.P. His Research interests include Data Mining and Computer Networks.