SlideShare a Scribd company logo
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering &Technology (IJARCET)
Volume 2, Issue 3, March 2013
901
All Rights Reserved © 2013 IJARCET
A Survey on Data Aggregation Techniques for
Wireless Sensor Networks
Kriti Saini Parveen Kumar Jatin Sharma
Abstract-Wireless Sensor Network is an area of growing interest in which recent advancements in the field of sensing, computing
and communication attracted various research efforts. Limitations of sensors involve power consumption, computation as well as
communication capability. Data aggregation is one practical solution of constraint of power consumption. Various Data
aggregation schemes have been proposed on the basis of privacy homomorphism. Privacy homomorphism allows direct
computation on encrypted data. Thus, Data Aggregation helps in reducing transmission overhead as well as better security.
Index Terms—Concealed data aggregation, wireless sensor networks.
I. INTRODUCTION
Wireless Sensor Node (WSN) is a network which
consists of small sensor nodes that gather data from the
surrounding environment with sensing, computing and
communication capabilities. There are various
applications in which wireless sensor networks are
deployed such as military field Surveillance,
environmental monitoring, intrusion detection, habitat
monitoring and health care to detect temperature, entity
movement, humidity and seismic activity. WSN is also
defined as special class of ad hoc wireless network.
Wireless sensor network contains thousands of sensor
nodes distributed in an environment which detects
target within its range, collects data and perform
computation on that data. Sensor nodes consist of
application specific sensors, simple processor, wireless
transceiver and battery. Sensor nodes are deployed
with limited amount of power; therefore, a commonly
employed technique of data aggregation is used to
minimize the transmission overhead.[1] Various data
aggregation schemes based on privacy homomorphism
also provides security. Privacy homomorphism means
Computation performed on the encrypted data without
decrypting it.
II. ISSUES IN WIRELESS SENSOR
NETWORKS
The major issues that affect wireless sensor network
are following: Hardware and Operating system for
WSN, Wireless radio communication characteristics,
medium access schemes, deployment, localization,
synchronization, calibration, network layer, transport
layer, data aggregation and data dissemination,
database centric and querying, architecture,
programming models for sensor networks,
middleware, quality of service and security. Main
objective of sensor nodes is Data gathering.
Data is sensed periodically by the surrounding
environment and process
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering &Technology (IJARCET)
Volume 2, Issue 3, March 2013
902
All Rights Reserved © 2013 IJARCET
it before transmitting it to the sink. Number of sensors
as well as frequency of reporting the data depends on a
particular application. Sensors often generate
redundant data and a huge amount of data is collected
for processing by the base station.[2] This leads to the
Data Aggregation. Some of the design issues in data
aggregation include: unreliability of sensors, improving
of clustering techniques, improving in-networking
aggregation techniques. Main focus is towards energy
conservation. Other issues are improving security in
data transmission, handling tradeoffs, improving
quality of service.
III. CDA: CONCEALED DATA
AGGREGATION IN WIRELESS SENSOR
NETWORKS
In this paper, Tiny and cheap cost sensors consist of
application-specific sensors, a wireless transceiver,
simple processor and a battery. Problem of end-to-end
encryption of data is introduced. An encryption
transformation known as privacy homomorphism that
allows encrypted data to be computed without
decrypting it. Let P and C denote Plaintexts and Cipher
texts respectively. Let K be the key space.
Encryption transformation: E: K x P→C
Decryption transformation: D: K x C→P
PH can be performed additively and multiplicatively.
Additive Homomorphism:
a+b = Dk( Ek(a)+ Ek(b))
Multiplicatively Homomorphism: a x b = Dk( Ek(a) x
Ek(b)). RSA is a multiplicative PH.
IV. RCDA: RECOVERABLE CONCEALED
DATA AGGREGATION FOR DATA
INTEGRITY IN WIRELESS SENSOR
NETWORK.
In this paper, RCDA schemes are proposed for two
types of WSN i.e homogeneous and heterogeneous
WSN. Special feature of this scheme is that the base
station can securely recover all sensing data
generated by the sensor nodes rather than aggregated
results with less transmission overhead. In addition,
to ensure the authenticity and integrity, the aggregate
signature scheme is integrated. Although integration
of signature brings additional cost but still it is
affordable for WSN.
V. CDAMA: CONCEALED DATA
AGGREGATION FOR MULTIPLE
APPLICATIONS IN WIRELESS SENSOR
NETWORK.
CDAMA is the first concealed data aggregation
scheme for a multi-application environment.
CDAMA is based on the same logic as BGN, which
is constructed on a cyclic group of elliptic curve
points. BGN is implemented by using two points of
different orders; on the other hand, CDAMA is
designed by using multiple points, each of which has
different order. Through CDAMA,[3] the cipher texts
from distinct applications can be aggregated but not
mixed. CDAMA is application on WSNs while the
number of groups or applications is not large. This
scheme provides concealed data aggregation between
multiple groups. Basically CDAMA is a modification
from Boneh et al.’s PH scheme.
Three practical application scenarios are considered
for CDAMA:
a) First scenario is designed for multi-application
WSNs. Practically, sensor nodes with different
purposes may be distributed in same
environment for example smoke alarms,
thermometer sensors both are deployed together.
Now, if we apply conventional concealed data
aggregation schemes, the cipher texts of different
applications cannot be aggregated together
because if we do so the decrypted aggregated
result will be incorrect. Therefore, Aggregation
of cipher texts of different applications should be
done separately.
b) Second scenario is designed for single
application WSNs. CDAMA uses the
construction of multiple groups to lessen the
effect of compromising sensor nodes. Any
attacker can devise data only in that group that is
compromised.
c) Third scenario is designed for secure counting
capability. Base station knows exactly how many
messages are aggregated.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering &Technology (IJARCET)
Volume 2, Issue 3, March 2013
903
All Rights Reserved © 2013 IJARCET
VI. PUBLIC KEY BASED CRYPTOSCHEMES
FOR DATA CONCEALMENT IN WIRELESS
SENSOR NETWORK.
Mykletun proposed various Public key Encryption
Schemes with the comparison of their costs as well as
indication of how practically they can be
implemented. He worked on a concealed data
aggregation scheme based on elliptic curve Elgamal
(EC-EG) cryptosystem. Symbols that are used in this
scheme are + and x, where + denote addition and x
denote scalar multiplication on elliptic curve points.
Four procedures are there in this scheme: a) Key
Generation: Generate a key pair of private and public
key. b) Encryption: Encrypt message with public key.
c) Aggregation: A few aggregation functions are
listed which can be computed over enciphered data
and recommended which cryptosystem should be
used in which application. d) Decryption: Decrypt
cipher text with private key.[4]
He showed that their indeed exists a viable public-
key cryptosystem candidate for WSNs. This scheme
has two applications, Aggregation and Long term
data storage. The former involve functions like sum,
average, variance, checksum and movement
detection. The latter application relies on the fact that
data is stored in the nodes for later retrieval when
needed. Due to limited storage capability, the amount
of values is reduced. Therefore, we can use the
concept of Data aggregation to reduce the amount of
data stored at the nodes.
Symbols that are used in this scheme are + and x,
where + denote addition and x denote scalar
multiplication on elliptic curve points. Four
procedures are there in this scheme: a) Key
Generation: Generate a key pair of private and public
key. b) Encryption: Encrypt message with public key.
c) Aggregation: A few aggregation functions are
listed which can be computed over enciphered data
and recommended which cryptosystem should be
used in which application. d) Decryption: Decrypt
cipher text with private key.
VII. AGGREGATE AND VERIFIABLY
ENCRYPTED SIGNATURES FROM BILINEAR
MAPS
A concept of aggregated signatures and construction
of an efficient aggregate scheme based on bilinear
maps is introduced. An aggregate signature is a
digital signature that support aggregation means if n
signatures are given on n different messages from n
users, then to aggregate all these signatures into a
short signature will be possible. Aggregate Signatures
are helpful in reducing the size of messages in secure
routing protocols as well as in reducing the size of
certificate chains.[5] Introduction of additional
constraint for security purposes, that an aggregate
signature is valid only if it is an aggregation of
signatures on distinct messages. This scheme
includes one additional procedure: Key Generation
(KeyGen), Signing (sign), verifying (Verify),
aggregation (Agg), verifying aggregated signature
(Agg- Verify). Verifiably encrypted signatures can be
obtained with the help of aggregated signatures.
These signatures are helpful in applications like
online contract signing.
VII. REFERENCES:
[1] Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H,
Subir Kumar Sarkar , “ Issues in Wireless Sensor
Networks”, Proc. World Congress on Engineering
vol.1, London, U.K, 2008.
[2] Joao Girao, Markus Schneider, Dirk Westhoff, “
Issues in Wireless Sensor Networks”, Germany.
[3] Chien-Ming Chen, Yue Hsun Lin, Ya-Ching Lin
and Hung-Min Sun, “RCDA:Recoverable Concealed
Data Aggregation”, IEEE Trans. Parallel Systems,
vol 23, no.4, Hsinchu, Taiwan, pp727-733, 2011.
[4] E. Mykletun, J.Girao and D. Westhoff, “Public
Key based Cryptoschemes for Data Concealment in
Wireless Sensor Networks”, Proc. IEEE Int’l Conf.
Comm., vol. 5, Germany, pp. 2288-2295, 2006.
[5] D. Boneh, C. Gentry, B.Lynn and H. Shacham,
“Aggregate and Verifiably Encrypted Signatures
from Bilinear Maps”, Proc. 22nd
Int’l Conf. Theory
and Applications of Cryptographic Techniques
(Eurocrypt), pp. 416-432, 2003.

More Related Content

What's hot

HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Pvrtechnologies Nellore
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
LeMeniz Infotech
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Walchand college of Engineering,Sangli
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Pvrtechnologies Nellore
 
D0371028039
D0371028039D0371028039
D0371028039
inventionjournals
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
F33022028
F33022028F33022028
F33022028
IJERA Editor
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
IJERA Editor
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 

What's hot (18)

HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
D0371028039
D0371028039D0371028039
D0371028039
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
F33022028
F33022028F33022028
F33022028
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
H43064650
H43064650H43064650
H43064650
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 

Viewers also liked

ENG.Mohamed CV
ENG.Mohamed CVENG.Mohamed CV
ENG.Mohamed CV
Mohamed Sharaf
 
THE NATIONS WHICH WONT PROSPER
THE NATIONS WHICH WONT PROSPERTHE NATIONS WHICH WONT PROSPER
THE NATIONS WHICH WONT PROSPER
Roland Ofori
 
zeeshan.n rana
zeeshan.n ranazeeshan.n rana
zeeshan.n rana
zeeshan ali
 
Credit Service Certificate
Credit Service CertificateCredit Service Certificate
Credit Service CertificateNathan Hendricks
 
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSESHOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
Roland Ofori
 
Tipologia de puentes
Tipologia de puentesTipologia de puentes
Tipologia de puentes
Crhis Lopez
 
Presentacion general babel studies
Presentacion general babel studiesPresentacion general babel studies
Presentacion general babel studies
Julian Babel
 
Resume2016_New
Resume2016_NewResume2016_New
Resume2016_New
Santosh Jadhav
 
Naukri Resume Naveen Kumar VADDE
Naukri Resume Naveen Kumar VADDENaukri Resume Naveen Kumar VADDE
Naukri Resume Naveen Kumar VADDE
Naveen Kumar VADDE FMP®​ SFP® 5S LA®
 

Viewers also liked (10)

ENG.Mohamed CV
ENG.Mohamed CVENG.Mohamed CV
ENG.Mohamed CV
 
THE NATIONS WHICH WONT PROSPER
THE NATIONS WHICH WONT PROSPERTHE NATIONS WHICH WONT PROSPER
THE NATIONS WHICH WONT PROSPER
 
zeeshan.n rana
zeeshan.n ranazeeshan.n rana
zeeshan.n rana
 
Credit Service Certificate
Credit Service CertificateCredit Service Certificate
Credit Service Certificate
 
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSESHOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
HOW OUR BLESSINGS CAN EASILY TURN INTO CURSES
 
Tipologia de puentes
Tipologia de puentesTipologia de puentes
Tipologia de puentes
 
Presentacion general babel studies
Presentacion general babel studiesPresentacion general babel studies
Presentacion general babel studies
 
tata inplant training
tata inplant trainingtata inplant training
tata inplant training
 
Resume2016_New
Resume2016_NewResume2016_New
Resume2016_New
 
Naukri Resume Naveen Kumar VADDE
Naukri Resume Naveen Kumar VADDENaukri Resume Naveen Kumar VADDE
Naukri Resume Naveen Kumar VADDE
 

Similar to Ijarcet vol-2-issue-3-901-903

Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
International Journal of Reconfigurable and Embedded Systems
 
wcn.pptx
wcn.pptxwcn.pptx
wcn.pptx
RahulRam100
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
IJERA Editor
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
ijassn
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
ijassn
 
50120140506010
5012014050601050120140506010
50120140506010
IAEME Publication
 
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
cscpconf
 
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...
csandit
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
IJERD Editor
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
1678 1683
1678 16831678 1683
1678 1683
Editor IJARCET
 
J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 

Similar to Ijarcet vol-2-issue-3-901-903 (20)

Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
wcn.pptx
wcn.pptxwcn.pptx
wcn.pptx
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
 
50120140506010
5012014050601050120140506010
50120140506010
 
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
 
A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
J031101064069
J031101064069J031101064069
J031101064069
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Ijarcet vol-2-issue-3-901-903

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering &Technology (IJARCET) Volume 2, Issue 3, March 2013 901 All Rights Reserved © 2013 IJARCET A Survey on Data Aggregation Techniques for Wireless Sensor Networks Kriti Saini Parveen Kumar Jatin Sharma Abstract-Wireless Sensor Network is an area of growing interest in which recent advancements in the field of sensing, computing and communication attracted various research efforts. Limitations of sensors involve power consumption, computation as well as communication capability. Data aggregation is one practical solution of constraint of power consumption. Various Data aggregation schemes have been proposed on the basis of privacy homomorphism. Privacy homomorphism allows direct computation on encrypted data. Thus, Data Aggregation helps in reducing transmission overhead as well as better security. Index Terms—Concealed data aggregation, wireless sensor networks. I. INTRODUCTION Wireless Sensor Node (WSN) is a network which consists of small sensor nodes that gather data from the surrounding environment with sensing, computing and communication capabilities. There are various applications in which wireless sensor networks are deployed such as military field Surveillance, environmental monitoring, intrusion detection, habitat monitoring and health care to detect temperature, entity movement, humidity and seismic activity. WSN is also defined as special class of ad hoc wireless network. Wireless sensor network contains thousands of sensor nodes distributed in an environment which detects target within its range, collects data and perform computation on that data. Sensor nodes consist of application specific sensors, simple processor, wireless transceiver and battery. Sensor nodes are deployed with limited amount of power; therefore, a commonly employed technique of data aggregation is used to minimize the transmission overhead.[1] Various data aggregation schemes based on privacy homomorphism also provides security. Privacy homomorphism means Computation performed on the encrypted data without decrypting it. II. ISSUES IN WIRELESS SENSOR NETWORKS The major issues that affect wireless sensor network are following: Hardware and Operating system for WSN, Wireless radio communication characteristics, medium access schemes, deployment, localization, synchronization, calibration, network layer, transport layer, data aggregation and data dissemination, database centric and querying, architecture, programming models for sensor networks, middleware, quality of service and security. Main objective of sensor nodes is Data gathering. Data is sensed periodically by the surrounding environment and process
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering &Technology (IJARCET) Volume 2, Issue 3, March 2013 902 All Rights Reserved © 2013 IJARCET it before transmitting it to the sink. Number of sensors as well as frequency of reporting the data depends on a particular application. Sensors often generate redundant data and a huge amount of data is collected for processing by the base station.[2] This leads to the Data Aggregation. Some of the design issues in data aggregation include: unreliability of sensors, improving of clustering techniques, improving in-networking aggregation techniques. Main focus is towards energy conservation. Other issues are improving security in data transmission, handling tradeoffs, improving quality of service. III. CDA: CONCEALED DATA AGGREGATION IN WIRELESS SENSOR NETWORKS In this paper, Tiny and cheap cost sensors consist of application-specific sensors, a wireless transceiver, simple processor and a battery. Problem of end-to-end encryption of data is introduced. An encryption transformation known as privacy homomorphism that allows encrypted data to be computed without decrypting it. Let P and C denote Plaintexts and Cipher texts respectively. Let K be the key space. Encryption transformation: E: K x P→C Decryption transformation: D: K x C→P PH can be performed additively and multiplicatively. Additive Homomorphism: a+b = Dk( Ek(a)+ Ek(b)) Multiplicatively Homomorphism: a x b = Dk( Ek(a) x Ek(b)). RSA is a multiplicative PH. IV. RCDA: RECOVERABLE CONCEALED DATA AGGREGATION FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORK. In this paper, RCDA schemes are proposed for two types of WSN i.e homogeneous and heterogeneous WSN. Special feature of this scheme is that the base station can securely recover all sensing data generated by the sensor nodes rather than aggregated results with less transmission overhead. In addition, to ensure the authenticity and integrity, the aggregate signature scheme is integrated. Although integration of signature brings additional cost but still it is affordable for WSN. V. CDAMA: CONCEALED DATA AGGREGATION FOR MULTIPLE APPLICATIONS IN WIRELESS SENSOR NETWORK. CDAMA is the first concealed data aggregation scheme for a multi-application environment. CDAMA is based on the same logic as BGN, which is constructed on a cyclic group of elliptic curve points. BGN is implemented by using two points of different orders; on the other hand, CDAMA is designed by using multiple points, each of which has different order. Through CDAMA,[3] the cipher texts from distinct applications can be aggregated but not mixed. CDAMA is application on WSNs while the number of groups or applications is not large. This scheme provides concealed data aggregation between multiple groups. Basically CDAMA is a modification from Boneh et al.’s PH scheme. Three practical application scenarios are considered for CDAMA: a) First scenario is designed for multi-application WSNs. Practically, sensor nodes with different purposes may be distributed in same environment for example smoke alarms, thermometer sensors both are deployed together. Now, if we apply conventional concealed data aggregation schemes, the cipher texts of different applications cannot be aggregated together because if we do so the decrypted aggregated result will be incorrect. Therefore, Aggregation of cipher texts of different applications should be done separately. b) Second scenario is designed for single application WSNs. CDAMA uses the construction of multiple groups to lessen the effect of compromising sensor nodes. Any attacker can devise data only in that group that is compromised. c) Third scenario is designed for secure counting capability. Base station knows exactly how many messages are aggregated.
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering &Technology (IJARCET) Volume 2, Issue 3, March 2013 903 All Rights Reserved © 2013 IJARCET VI. PUBLIC KEY BASED CRYPTOSCHEMES FOR DATA CONCEALMENT IN WIRELESS SENSOR NETWORK. Mykletun proposed various Public key Encryption Schemes with the comparison of their costs as well as indication of how practically they can be implemented. He worked on a concealed data aggregation scheme based on elliptic curve Elgamal (EC-EG) cryptosystem. Symbols that are used in this scheme are + and x, where + denote addition and x denote scalar multiplication on elliptic curve points. Four procedures are there in this scheme: a) Key Generation: Generate a key pair of private and public key. b) Encryption: Encrypt message with public key. c) Aggregation: A few aggregation functions are listed which can be computed over enciphered data and recommended which cryptosystem should be used in which application. d) Decryption: Decrypt cipher text with private key.[4] He showed that their indeed exists a viable public- key cryptosystem candidate for WSNs. This scheme has two applications, Aggregation and Long term data storage. The former involve functions like sum, average, variance, checksum and movement detection. The latter application relies on the fact that data is stored in the nodes for later retrieval when needed. Due to limited storage capability, the amount of values is reduced. Therefore, we can use the concept of Data aggregation to reduce the amount of data stored at the nodes. Symbols that are used in this scheme are + and x, where + denote addition and x denote scalar multiplication on elliptic curve points. Four procedures are there in this scheme: a) Key Generation: Generate a key pair of private and public key. b) Encryption: Encrypt message with public key. c) Aggregation: A few aggregation functions are listed which can be computed over enciphered data and recommended which cryptosystem should be used in which application. d) Decryption: Decrypt cipher text with private key. VII. AGGREGATE AND VERIFIABLY ENCRYPTED SIGNATURES FROM BILINEAR MAPS A concept of aggregated signatures and construction of an efficient aggregate scheme based on bilinear maps is introduced. An aggregate signature is a digital signature that support aggregation means if n signatures are given on n different messages from n users, then to aggregate all these signatures into a short signature will be possible. Aggregate Signatures are helpful in reducing the size of messages in secure routing protocols as well as in reducing the size of certificate chains.[5] Introduction of additional constraint for security purposes, that an aggregate signature is valid only if it is an aggregation of signatures on distinct messages. This scheme includes one additional procedure: Key Generation (KeyGen), Signing (sign), verifying (Verify), aggregation (Agg), verifying aggregated signature (Agg- Verify). Verifiably encrypted signatures can be obtained with the help of aggregated signatures. These signatures are helpful in applications like online contract signing. VII. REFERENCES: [1] Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H, Subir Kumar Sarkar , “ Issues in Wireless Sensor Networks”, Proc. World Congress on Engineering vol.1, London, U.K, 2008. [2] Joao Girao, Markus Schneider, Dirk Westhoff, “ Issues in Wireless Sensor Networks”, Germany. [3] Chien-Ming Chen, Yue Hsun Lin, Ya-Ching Lin and Hung-Min Sun, “RCDA:Recoverable Concealed Data Aggregation”, IEEE Trans. Parallel Systems, vol 23, no.4, Hsinchu, Taiwan, pp727-733, 2011. [4] E. Mykletun, J.Girao and D. Westhoff, “Public Key based Cryptoschemes for Data Concealment in Wireless Sensor Networks”, Proc. IEEE Int’l Conf. Comm., vol. 5, Germany, pp. 2288-2295, 2006. [5] D. Boneh, C. Gentry, B.Lynn and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps”, Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp. 416-432, 2003.