An Enhanced Security Pattern for Wireless Sensor Network
Conference proceedings article
Authors / Editors
Research Areas
No matching items found.
Publication Details
Author list: Kuthadi VM, Selvaraj R, Marwala T
Publisher: Springer Verlag (Germany)
Place: BERLIN
Publication year: 2016
Journal: Advances in Intelligent Systems and Computing (2194-5357)
Journal acronym: ADV INTELL SYST
Volume number: 380
Start page: 61
End page: 71
Number of pages: 11
ISBN: 978-81-322-2522-5
eISBN: 978-81-322-2523-2
ISSN: 2194-5357
eISSN: 2194-5365
Languages: English-Great Britain (EN-GB)
View in Web of Science | View on publisher site | View citing articles in Web of Science
Abstract
Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done by clustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.
Keywords
Data aggregation, False data injecting attack, Pattern generation, Wireless Sensor Network
Documents
No matching items found.