A Study of Effective and Secure Data Aggregation protocol for WSN Presence of Collision Attacks

K. Venkata Lakshmi, Lakshmi Kanagala

Abstract


Network security involves the authorization of access to data in a network, which is controlled the network administrator. Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. Collision attack means 0the group of nodes to access the illegal data. The data collected from individual nodes is aggregated at a base station or host computer. Due to limited computational power and power resources, aggregation of information from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. As we have limited energy resources and computational power, data aggregation from multiple sensor nodes is done using simple methods such as averaging. WSN’s are usually unattended they are highly vulnerable to node compromising attacks. WSN the computational power of very low power processors dramatically increases, mostly driven by demands of mobile computing. When the cost of such technology drops, WSNs will be able to afford hardware which can implement more sophisticated data aggregation and trust assessment algorithms. Data aggregation in WSN is usually done by easy methods like averaging, these strategies area unit at risk of sure attacks. This technique makes them not solely collision strong, however conjointly additional correct and quicker connection. But, our experiments show that our methodology works quite well for different varieties of errors with none modification. These algorithms simultaneously aggregate data from multiple sources and provide a trust estimation of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. In this paper we analyzed some secure data aggregation mechanisms and introduced a new complicated collision attack with its impact on wireless sensor network.

 


Keywords


Collusion Attacks, Data aggregation, Iterative Filtering Algorithm, Wireless sensor networks

Full Text:

PDF




Copyright (c) 2016 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org