SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 259
A Secured method of Data Aggregation for Wireless Sensor Networks in
the Presence of Collusion Attacks
Mohith Aiyappa S1, Ravi Kumar M N2
1 PG Scholar, Dept. of E&C, Malnad college of engineering, Karnataka, India
2 Associate Professor, Dept. of E&C, Malnad college of engineering, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s world Wireless Sensor Networks
(WSNs) plays a major role in various applications ranging
from weather monitoring to military and surveillance
applications. In each of these applications the sensor nodes
senses the data and transmits the sensed data to the sink
node. In earlier days data is transmitted to the sink directly
without preprocessing using either single hop or by multi
hop techniques in the network, hence this method consumes
more energy. Data aggregation is an effective technique in
WSN because it reduces the number of packets to be sent to
sink and increases the lifetime of sensor network by
aggregating the similar packets. Secure data transmission is
a crucial need for achieving the QOS in WSN. Secure data
aggregation technique is one of the very efficient technique
to overcome the problem of weaker node attacks. To achieve
this, IF Algorithm is used which is most effective solution. IF
Algorithm is an efficient and reliable option for WSN
because they solve both problems of data aggregation and
data trustworthiness estimation using a single iterative
procedure. In this paper planned to concentrate on many IF
Algorithm which make robust against collusion attacks than
simply averaging method. In WSN aggregation plays an
important role in improving capacity. Data aggregation
could be of two types, Exact and Approximate. Collusion
attack means attacker tries to corrupt transmitting data,
hence there will be a mismatch in aggregation.it is the
agreement between nodes to act together secretly or
illegally in order to deceive or cheat original data.
To avoid collusion IF algorithm has been
implemented. Iteration is the act of repeating a process,
either to generate a unbounded sequence of outcomes or
with the aim of approaching a desired goal, target or result.
Each repetition of the process is also called as an Iteration.
In mathematical Iteration function is used by applying a
function repeatedly using the output from one iteration as
the input to the next. Iterative filtering algorithms are a tool
for maximum likelihood inference on partially observed
dynamical systems. In this project different IF algorithm has
been used to avoid collusion and get a proper result.
Key Words: Wireless Sensor Networks, Sensor
Nodes, IF Algorithm, Collusion Attacks, Secure
Data Aggregation.
1. INTRODUCTION
The primary use of Wireless Sensor Networks(WSN) is to
collect and process data. WSN are emerging as the widely
used technology in the present day world. A wireless
sensor networks consists of a collection of these nodes
that have the facility to sense, process data and
communicate with each other via wireless connection.
WSN is a network system comprised of spatially
distributed devices using the wireless sensor nodes to
monitor physical or environmental situations such as
sound, temperature and motion. The main goal of data
aggregation is to gather and aggregate data in an energy
efficient manner so that network lifetime is enhanced. Fig
1 shows the network model for WSN. The sensor nodes
are divided into different clusters and each cluster
appointed as a cluster head. data are periodically
monitoring from each node and then pass their data to the
cluster head. finally cluster head processing that data and
pass to the base station. WSN offer an increasingly
attractive method of data gathering in distributed system
architectures and dynamic access via wireless
connectivity. The process of grouping sensor nodes in a
densely deployed large scale sensor network is known as
clustering. sensor networks are the collection of sensor
nodes which cooperatively send sensed data to base
station. As sensor nodes are battery driven an efficient
utilization of power is essential in ore use networks for
long duration.
In WSN aggregation plays an important role in improving
capacity. Data aggregation could be of two types. Exact and
Approximate. collusion attack means attacker tries to
corrupt transmitting data, hence there will be a mismatch
in aggregation.it is the agreement between nodes to act
together secretly or illegally in order to deceive or cheat
original data.
To avoid collusion IF algorithm has been implemented.
Iteration is the act of repeating a process, either to
generate a unbounded sequence of outcomes or with the
aim of approaching a desired goal, target or result. Each
repetition of the process is also called as an Iteration. In
mathematical Iteration function is used by applying a
function repeatedly using the output from one iteration as
the input to the next. Iterative filtering algorithms are a
tool for maximum likelihood inference on partially
observed dynamical systems. In this project different IF
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 260
algorithm has been used to avoid collusion and get a
proper result.
Fig. 1.Model for WSN
2. RELATED WORK
Many actions are discussed about different algorithm
related to secure data aggregation. Aggregation problem
has been solved by, investigate the relationship between
security and data aggregation process in WSN. A taxonomy
of secure data aggregation protocols is given by looking
over the current “state-of-the-art” work in this area [1]
Synopsis diffusion approach make the protect against the
attack launched by the compromised nodes. The algorithm
is to enable the base station to securely process predicate
count or sum even in the presence of such an attack.[2]
The computational proficient strategy to process a
weighted normal (which we will call strong average)of
sensor measurements, which appropriately takes sensor
deficiencies and sensor noise into consideration[3]
The security vulnerabilities of data aggregation system
and present a survey of robust and secure aggregation
protocols that are resilient to false data injection
attacks.[4]
The algorithm present an analysis framework that allows
for general decomposition of existing reputation systems.
the attacks are classified against reputation systems by
identifying which system components and design choices
are the target of attacks.[5]
The aggregation strategies become bandwidth intensive
when combined with fault tolerant, multipath routing
methods often used in these environments.[6]
To address the security issue one technique has been
proposed that is to provide security to network from an
attacker and also enhance the robustness and accuracy of
an information. Iterative filtering algorithm is one of the
algorithm to perform secure data aggregation and also
provides security to the entire network.[7]
3. METHODOLOGY
In our proposed system we have considered IF algorithms
has been proposed.
Fig. 2.Methodology
The above figure shows the block diagram and flow
diagram of the iterative filter algorithm.
4.ITERATIVE FILTERING ALGORITHM
Iteration is the demonstration of repeating process either
to produce an unbounded grouping of result or with the
aim of approaching a desired goal, target or result. Each
process of repetition is likewise called an iteration and the
result of one iteration are utilized as the beginning stage
for the next iteration.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 261
Iteration in arithmetic may refer to the way toward
emphasizing a capacity i.e. applying a function repeatedly,
utilizing the output from one cycle as the input to the next.
cycle apparently simple functions can create complex
behaviours and difficult issues.
In computational arithmetic, an iterative technique is a
numerical methodology that produces arrangement of
enhancing approximate solutions for a class of problems
4.1 Benefits of IF Algorithm
• Some Iterative algorithms are designed for
accuracy.
• Round off error are subjected to direct method.
• Iterating function reduces error to zero.
• It produces answer in a faster manner.
• It solves many matrix functions.
• speeds depends on number of non zero elements
and total number of elements.
• It starts with approximate answers that is output
can be acted as next input.
• Each iteration improves accuracy.
• During iteration matrix can not be changed so it
can be operated efficiently.
4.2 Steps of IF Algorithm
• In the first step initialize the first round of
iteration. taking the first round of output as the
input to the next round
• In the second step initialize inputs as X,n,m where
X is the block of readings and n is the number of
sensors and m is the number of readings for each
sensors.
• In the third step compute the output of reputation
vector r that is output can be represented as r.
• In the next step initialize weight by giving equal
credibility that is w(0) = 1 and multiplying that
weight with X.
• After multiplying compute reputation vector r(l+1),
assume l=0.
• In the sixth step compute the corresponding
weight that is w(l+1).
• In the final step repeat the above steps until the
reputation vector has converged that means if the
aggregate values are same for some iterations then
stop the process.
Fig. 3.Flowchart of IF Algorithm
4.3 Modules for secure data aggregation using IF
1) Node creation with weight factors assigned to
source.
2) Data aggregation in multiple sources.
3) Find bias and unbiased readings using IF.
4) Secure data aggregation using IF.
5. MATHEMATICAL ANALYSIS
In the reputation system of iterative filtering we will see
the context of data aggregation in WSN and the weakness
of the algorithm for a possible collusion attack.
Consider a wireless sensor network with n number of
sensors denoted by where . Data
aggregator can be operated only one block of readings at a
time.each block can be operated at a readings of m
consecutive instants.
The matrix can be represented as
where The
output vector is for a time instants
The reputation vector can be computed iteratively and
simultaneously with a sequence of weights
. Initially the iterating procedure starts with
giving equal number of weights to all sensors that is
. Then the reputation vector can be calculated
as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262
∑
The begining of the reputation vector can be represented
as that is .
is just the simple average of readings of all sensors at
each particular instants.The new weight vector can
be computed as a function of then
‖ ‖
Function is called as the discriminant function
• Reciprocal
• Exponential
• Affine
The above formulas are based on the computation of IF
Algorithm.
6. COLLUSION ATTACK SCENARIO
Collusion attack means a secret understanding between
two or more persons to gain something illegally.In wireless
sensor network collusion attack means some hackers inject
false data to the original node to mismatch the aggregate
readings.In this scenario attacker is able to mislead the
reported data values.
Let us consider three scenarios as shown in the below
figure. Figure 3.2 shows the different scenarios against IF
algorithm.
Fig. 4. Attacks scenario in IF
In the first scenario all sensors are reliable and the result
of the IF calculations is near to the actual value.
In the second scenario an adversary compromises two
sensor hubs, and modifies the readings of these values
such that the normal average of all sensor readings is
skewed towards a lower esteem. In that case IF algorithm
punishes them and allots to them lower weights, because
their values are a long way from the estimation of other
sensors. Iterative Filter algorithm is strong against false
data information because the compromised nodes
individually falsify the readings without any learning
about the aggregation calculation.
In the Third scenario an adversary employs three
compromised nodes in order to launch a collusion attack.
It listens to the reports of sensors in the network and
instructs the two compromised sensor nodes to report
values far from the true value of the measured quantity.
7. RESULT ANALYSIS
Fig. 5. Unbiased error using MLE
Fig. 6.Bias error
Fig. 7.Unbiased error
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263
Fig. 8. Correlated noise
Fig.9. dVKD- Reciprocal
Fig. 10. dKVD- Affine noise
Fig.11. Zhou
Fig.12. Laureti
Fig.13. Robust aggregate Reciprocal
Fig.14. Robust aggregate Affine
The above figure shows the result of different IF
algorithms. Different IF algorithms give different types of
data aggregate readings.
8. COMPARSION RESULT
Fig.15. Network Lifetime
Fig.16. Energy Consumption
Fig.17. Throughput
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264
9. CONCLUSION
In wireless sensor networks, an attacker can inject false
data to damage the network data integrity by utilizing a
compromised node Existing researches did not combine
data aggregation, data Confidentiality, data integrity and
false data detection together well. In this paper we
proposed an improvement for the IF algorithms by
providing an initial approximation of the trustworthiness
of sensor nodes which makes the algorithms not only
collusion robust, but also more accurate and faster
converging.so finally we concluded that proposed IF
algorithm is better than existing algorithm like network
lifetime, energy consumption and throughput. In future,
we will investigate whether our approach can protect
against compromised aggregators.
REFERENCES
[1] Y. X. Suat Ozdemir Secure data aggregation in wireless
sensor networks: A comprehensive overview, Elsevier
computer Networks 2009
[2] Z. H. L. Sankardas Roy, Mauro Conti and S. Jajodia
Secure data aggregation in wireless sensor networks:
Filtering out the attackers impact,IEEE Transactionon
Information forensic and security., vol. 09, no. 4, 2014.
[3] W. H. Chun Tung Chou Efficient computation of robust
average of compressive sensing data in wireless
sensor networks in the presence of sensor faults ,IEEE
journal 2010
[4] Sanjeev SETIA , Sankardas ROY and Sushil JAJODIA
Secure Data Aggregation in Wireless Sensor
Networks” Department of Computer Science
Proceedings of IEEE International Conference 2010
[5] Kevin Hoffman, David Zage, Cristina Nita-Rotaru A
Survey of Attack and Defense Techniques for
Reputation Systems” Department of Computer Science
and CERIAS, Purdue University, 2007
[6] George Kollios, John Byers, Jeffrey Considine, Marios
Hadjieleftheriou, and Feifei Li Robust Aggregation in
Sensor Networks” Department of Computer Science,
Boston University, 2005 IEEE
[7] X.Wu,Y.Xiong,W.Huang,H.Shen,M.Li. An efficient
compressive data gathering routing scheme for large-
scale wireless sensor networks,
ElsevierComput.Electr.Eng,39(2013).1935-1946.
[8] K.Suriya, R.Dhanagopal An Efficient Apporach For
Secure Data Aggregation Technique For Wsn In The
Presence Of Security Attacks,Department of ECE, 2015
IJARTET
[9] C.de Kerchove and P. Van Dooren Iterative filtering in
reputation systems, , SIAM J. Matrix Anal. Appl., vol. 31, no.
4, pp. 1812-1834, Mar. 2010.

More Related Content

What's hot

A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...IJNSA Journal
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET Journal
 
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Eswar Publications
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A Survey on Wireless Network Simulators
A Survey on Wireless Network SimulatorsA Survey on Wireless Network Simulators
A Survey on Wireless Network SimulatorsjournalBEEI
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense applicationSayed Abulhasan Quadri
 
Document retrieval using clustering
Document retrieval using clusteringDocument retrieval using clustering
Document retrieval using clusteringeSAT Journals
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED
 
Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Sayed Abulhasan Quadri
 
Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...IJECEIAES
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
Dependable fire detection_system_with_multifunctio
Dependable fire detection_system_with_multifunctioDependable fire detection_system_with_multifunctio
Dependable fire detection_system_with_multifunctioBharath Kumar
 
IRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET Journal
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 

What's hot (17)

A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
ANALYSIS OF MACHINE LEARNING ALGORITHMS WITH FEATURE SELECTION FOR INTRUSION ...
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
 
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
A Survey on Wireless Network Simulators
A Survey on Wireless Network SimulatorsA Survey on Wireless Network Simulators
A Survey on Wireless Network Simulators
 
Data fusion
Data fusionData fusion
Data fusion
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense application
 
Document retrieval using clustering
Document retrieval using clusteringDocument retrieval using clustering
Document retrieval using clustering
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
 
Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...Multi sensor data fusion system for enhanced analysis of deterioration in con...
Multi sensor data fusion system for enhanced analysis of deterioration in con...
 
Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
Dependable fire detection_system_with_multifunctio
Dependable fire detection_system_with_multifunctioDependable fire detection_system_with_multifunctio
Dependable fire detection_system_with_multifunctio
 
IRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data ProtectionIRJET - Survey on Clustering based Categorical Data Protection
IRJET - Survey on Clustering based Categorical Data Protection
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 

Similar to IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks

IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network SecurityIRJET Journal
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsIRJET Journal
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream ModelingIJMER
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 

Similar to IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks (20)

IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique Algorithms
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
C1804011117
C1804011117C1804011117
C1804011117
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 

Recently uploaded (20)

Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 259 A Secured method of Data Aggregation for Wireless Sensor Networks in the Presence of Collusion Attacks Mohith Aiyappa S1, Ravi Kumar M N2 1 PG Scholar, Dept. of E&C, Malnad college of engineering, Karnataka, India 2 Associate Professor, Dept. of E&C, Malnad college of engineering, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s world Wireless Sensor Networks (WSNs) plays a major role in various applications ranging from weather monitoring to military and surveillance applications. In each of these applications the sensor nodes senses the data and transmits the sensed data to the sink node. In earlier days data is transmitted to the sink directly without preprocessing using either single hop or by multi hop techniques in the network, hence this method consumes more energy. Data aggregation is an effective technique in WSN because it reduces the number of packets to be sent to sink and increases the lifetime of sensor network by aggregating the similar packets. Secure data transmission is a crucial need for achieving the QOS in WSN. Secure data aggregation technique is one of the very efficient technique to overcome the problem of weaker node attacks. To achieve this, IF Algorithm is used which is most effective solution. IF Algorithm is an efficient and reliable option for WSN because they solve both problems of data aggregation and data trustworthiness estimation using a single iterative procedure. In this paper planned to concentrate on many IF Algorithm which make robust against collusion attacks than simply averaging method. In WSN aggregation plays an important role in improving capacity. Data aggregation could be of two types, Exact and Approximate. Collusion attack means attacker tries to corrupt transmitting data, hence there will be a mismatch in aggregation.it is the agreement between nodes to act together secretly or illegally in order to deceive or cheat original data. To avoid collusion IF algorithm has been implemented. Iteration is the act of repeating a process, either to generate a unbounded sequence of outcomes or with the aim of approaching a desired goal, target or result. Each repetition of the process is also called as an Iteration. In mathematical Iteration function is used by applying a function repeatedly using the output from one iteration as the input to the next. Iterative filtering algorithms are a tool for maximum likelihood inference on partially observed dynamical systems. In this project different IF algorithm has been used to avoid collusion and get a proper result. Key Words: Wireless Sensor Networks, Sensor Nodes, IF Algorithm, Collusion Attacks, Secure Data Aggregation. 1. INTRODUCTION The primary use of Wireless Sensor Networks(WSN) is to collect and process data. WSN are emerging as the widely used technology in the present day world. A wireless sensor networks consists of a collection of these nodes that have the facility to sense, process data and communicate with each other via wireless connection. WSN is a network system comprised of spatially distributed devices using the wireless sensor nodes to monitor physical or environmental situations such as sound, temperature and motion. The main goal of data aggregation is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Fig 1 shows the network model for WSN. The sensor nodes are divided into different clusters and each cluster appointed as a cluster head. data are periodically monitoring from each node and then pass their data to the cluster head. finally cluster head processing that data and pass to the base station. WSN offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. The process of grouping sensor nodes in a densely deployed large scale sensor network is known as clustering. sensor networks are the collection of sensor nodes which cooperatively send sensed data to base station. As sensor nodes are battery driven an efficient utilization of power is essential in ore use networks for long duration. In WSN aggregation plays an important role in improving capacity. Data aggregation could be of two types. Exact and Approximate. collusion attack means attacker tries to corrupt transmitting data, hence there will be a mismatch in aggregation.it is the agreement between nodes to act together secretly or illegally in order to deceive or cheat original data. To avoid collusion IF algorithm has been implemented. Iteration is the act of repeating a process, either to generate a unbounded sequence of outcomes or with the aim of approaching a desired goal, target or result. Each repetition of the process is also called as an Iteration. In mathematical Iteration function is used by applying a function repeatedly using the output from one iteration as the input to the next. Iterative filtering algorithms are a tool for maximum likelihood inference on partially observed dynamical systems. In this project different IF
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 260 algorithm has been used to avoid collusion and get a proper result. Fig. 1.Model for WSN 2. RELATED WORK Many actions are discussed about different algorithm related to secure data aggregation. Aggregation problem has been solved by, investigate the relationship between security and data aggregation process in WSN. A taxonomy of secure data aggregation protocols is given by looking over the current “state-of-the-art” work in this area [1] Synopsis diffusion approach make the protect against the attack launched by the compromised nodes. The algorithm is to enable the base station to securely process predicate count or sum even in the presence of such an attack.[2] The computational proficient strategy to process a weighted normal (which we will call strong average)of sensor measurements, which appropriately takes sensor deficiencies and sensor noise into consideration[3] The security vulnerabilities of data aggregation system and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks.[4] The algorithm present an analysis framework that allows for general decomposition of existing reputation systems. the attacks are classified against reputation systems by identifying which system components and design choices are the target of attacks.[5] The aggregation strategies become bandwidth intensive when combined with fault tolerant, multipath routing methods often used in these environments.[6] To address the security issue one technique has been proposed that is to provide security to network from an attacker and also enhance the robustness and accuracy of an information. Iterative filtering algorithm is one of the algorithm to perform secure data aggregation and also provides security to the entire network.[7] 3. METHODOLOGY In our proposed system we have considered IF algorithms has been proposed. Fig. 2.Methodology The above figure shows the block diagram and flow diagram of the iterative filter algorithm. 4.ITERATIVE FILTERING ALGORITHM Iteration is the demonstration of repeating process either to produce an unbounded grouping of result or with the aim of approaching a desired goal, target or result. Each process of repetition is likewise called an iteration and the result of one iteration are utilized as the beginning stage for the next iteration.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 261 Iteration in arithmetic may refer to the way toward emphasizing a capacity i.e. applying a function repeatedly, utilizing the output from one cycle as the input to the next. cycle apparently simple functions can create complex behaviours and difficult issues. In computational arithmetic, an iterative technique is a numerical methodology that produces arrangement of enhancing approximate solutions for a class of problems 4.1 Benefits of IF Algorithm • Some Iterative algorithms are designed for accuracy. • Round off error are subjected to direct method. • Iterating function reduces error to zero. • It produces answer in a faster manner. • It solves many matrix functions. • speeds depends on number of non zero elements and total number of elements. • It starts with approximate answers that is output can be acted as next input. • Each iteration improves accuracy. • During iteration matrix can not be changed so it can be operated efficiently. 4.2 Steps of IF Algorithm • In the first step initialize the first round of iteration. taking the first round of output as the input to the next round • In the second step initialize inputs as X,n,m where X is the block of readings and n is the number of sensors and m is the number of readings for each sensors. • In the third step compute the output of reputation vector r that is output can be represented as r. • In the next step initialize weight by giving equal credibility that is w(0) = 1 and multiplying that weight with X. • After multiplying compute reputation vector r(l+1), assume l=0. • In the sixth step compute the corresponding weight that is w(l+1). • In the final step repeat the above steps until the reputation vector has converged that means if the aggregate values are same for some iterations then stop the process. Fig. 3.Flowchart of IF Algorithm 4.3 Modules for secure data aggregation using IF 1) Node creation with weight factors assigned to source. 2) Data aggregation in multiple sources. 3) Find bias and unbiased readings using IF. 4) Secure data aggregation using IF. 5. MATHEMATICAL ANALYSIS In the reputation system of iterative filtering we will see the context of data aggregation in WSN and the weakness of the algorithm for a possible collusion attack. Consider a wireless sensor network with n number of sensors denoted by where . Data aggregator can be operated only one block of readings at a time.each block can be operated at a readings of m consecutive instants. The matrix can be represented as where The output vector is for a time instants The reputation vector can be computed iteratively and simultaneously with a sequence of weights . Initially the iterating procedure starts with giving equal number of weights to all sensors that is . Then the reputation vector can be calculated as
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262 ∑ The begining of the reputation vector can be represented as that is . is just the simple average of readings of all sensors at each particular instants.The new weight vector can be computed as a function of then ‖ ‖ Function is called as the discriminant function • Reciprocal • Exponential • Affine The above formulas are based on the computation of IF Algorithm. 6. COLLUSION ATTACK SCENARIO Collusion attack means a secret understanding between two or more persons to gain something illegally.In wireless sensor network collusion attack means some hackers inject false data to the original node to mismatch the aggregate readings.In this scenario attacker is able to mislead the reported data values. Let us consider three scenarios as shown in the below figure. Figure 3.2 shows the different scenarios against IF algorithm. Fig. 4. Attacks scenario in IF In the first scenario all sensors are reliable and the result of the IF calculations is near to the actual value. In the second scenario an adversary compromises two sensor hubs, and modifies the readings of these values such that the normal average of all sensor readings is skewed towards a lower esteem. In that case IF algorithm punishes them and allots to them lower weights, because their values are a long way from the estimation of other sensors. Iterative Filter algorithm is strong against false data information because the compromised nodes individually falsify the readings without any learning about the aggregation calculation. In the Third scenario an adversary employs three compromised nodes in order to launch a collusion attack. It listens to the reports of sensors in the network and instructs the two compromised sensor nodes to report values far from the true value of the measured quantity. 7. RESULT ANALYSIS Fig. 5. Unbiased error using MLE Fig. 6.Bias error Fig. 7.Unbiased error
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263 Fig. 8. Correlated noise Fig.9. dVKD- Reciprocal Fig. 10. dKVD- Affine noise Fig.11. Zhou Fig.12. Laureti Fig.13. Robust aggregate Reciprocal Fig.14. Robust aggregate Affine The above figure shows the result of different IF algorithms. Different IF algorithms give different types of data aggregate readings. 8. COMPARSION RESULT Fig.15. Network Lifetime Fig.16. Energy Consumption Fig.17. Throughput
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264 9. CONCLUSION In wireless sensor networks, an attacker can inject false data to damage the network data integrity by utilizing a compromised node Existing researches did not combine data aggregation, data Confidentiality, data integrity and false data detection together well. In this paper we proposed an improvement for the IF algorithms by providing an initial approximation of the trustworthiness of sensor nodes which makes the algorithms not only collusion robust, but also more accurate and faster converging.so finally we concluded that proposed IF algorithm is better than existing algorithm like network lifetime, energy consumption and throughput. In future, we will investigate whether our approach can protect against compromised aggregators. REFERENCES [1] Y. X. Suat Ozdemir Secure data aggregation in wireless sensor networks: A comprehensive overview, Elsevier computer Networks 2009 [2] Z. H. L. Sankardas Roy, Mauro Conti and S. Jajodia Secure data aggregation in wireless sensor networks: Filtering out the attackers impact,IEEE Transactionon Information forensic and security., vol. 09, no. 4, 2014. [3] W. H. Chun Tung Chou Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults ,IEEE journal 2010 [4] Sanjeev SETIA , Sankardas ROY and Sushil JAJODIA Secure Data Aggregation in Wireless Sensor Networks” Department of Computer Science Proceedings of IEEE International Conference 2010 [5] Kevin Hoffman, David Zage, Cristina Nita-Rotaru A Survey of Attack and Defense Techniques for Reputation Systems” Department of Computer Science and CERIAS, Purdue University, 2007 [6] George Kollios, John Byers, Jeffrey Considine, Marios Hadjieleftheriou, and Feifei Li Robust Aggregation in Sensor Networks” Department of Computer Science, Boston University, 2005 IEEE [7] X.Wu,Y.Xiong,W.Huang,H.Shen,M.Li. An efficient compressive data gathering routing scheme for large- scale wireless sensor networks, ElsevierComput.Electr.Eng,39(2013).1935-1946. [8] K.Suriya, R.Dhanagopal An Efficient Apporach For Secure Data Aggregation Technique For Wsn In The Presence Of Security Attacks,Department of ECE, 2015 IJARTET [9] C.de Kerchove and P. Van Dooren Iterative filtering in reputation systems, , SIAM J. Matrix Anal. Appl., vol. 31, no. 4, pp. 1812-1834, Mar. 2010.