Volume- 2
Issue- 4
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr.T.Abirami , D.Evangeline
Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time. A Wireless Sensor Network (WSN) is a energy and security constraint network. Clustering is used for load balance to extend the lifetime of a sensor network by reducing energy consumption .In the existing secure aggregation scheme, once the cluster heads are attacked by malicious attacker, compromised nodes in the network will forge false values as the aggregation results of other nodes and it does not balance the load among clusters so it provide less throughput. Tricking the base station into accepting false aggregation results in networks is envisioned to be economic solutions to many important applications. Energy efficient load balancing algorithm is proposed to balance the load among the clusterby using some backup nodes. This approach will increase the network lifetime, high throughput and avoid overload by distributing work among identical type of sensor nodes with energy and security efficient routes. In the continuous aggregation, the adversary could manipulate a series of aggregation results through compromised nodes to fabricate false temporal variation patterns of the aggregates. To make the aggregates more effective the data packets are transmitted in a secure manner by using the digital signature cryptosystem
[1] Lei S. and Li Y. (2014), ‘Secure Continuous Aggregatio in Wireless Sensor Networks’, proceeding IEEE Transaction on Parallel and Distributed Systems,pp. 265-266.
[2] SajidHussain D. and Abdul Matin W. (2013), ‘Hierarchical Cluster-based Routing in Wireless Sensor Networks’, proceeding on IEEE Transaction on Computing Systems (ICDCS), pp. 255-259.
[3] Ji S. and Cai Z. (2012), ‘Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks’, IEEE INFOCOM, pp. 2113-2122.
[4] Ji S., Beyah R. and Cai Z. (2012), ‘Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks’, proceeding on IEEE INFOCOM, pp. 1035-1043.
[5] Cai Z., Ji S. and Bourgeois A G. (2012), ‘Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks’, IEEE Transaction on Distributed Computing Systems (ICDCS), pp. 245-254.
[6] Yang Y., Wang X., and Cao G. (2006), ‘SDAP: A Secure Hop-By- Hop Data Aggregation Protocol for Sensor Networks’, ACM Mobile Hoc, pp. 356-367.
[7] Chan H., Perrig A., and Song D. (2006), ‘Secure Hierarchical In-Network Aggregation in Sensor Networks’, ACM Conference Computer and Communication Security (CCS), pp. 278-287.
[8] Dr.T.Abirami, M.Meenalochini(2014) Secure Data Aggregation with False Temporal Pattern Identification for Wireless Sensor Networks,International Journal of Engineering and Advanced T echnology,pp.195-197
[9] Dr.T.Abirami,M.Meenalochini(2015) , Secure continuous aggregation with load balancing for wireless sensor networks, international journal of advanced research trends in engineering and technology,pp.72-76
[10] Liu D. (2003), ‘Establishing Pairwise Keys in Distributed Sensor Networks”, ACM Conference on Computer and Communication Security (CCS), pp. 52-61.
[11] Przydatek B., and Perrig A. (2003), ‘SIA: Secure Information Aggregation in Sensor Networks’, ACM Conference on Embedded Networked Sensor Systems, pp. 255- 265.
[12] Madden S. (2002), ‘Tag: A Tiny Aggregation Service for Ad-Hoc Sensor Networks’, Operating Systems Design and Implementation (OSDI), pp.4192-4203.
Assistant Professor (SRG), Department of IT, Kongu Engineering College, Perundurai
No. of Downloads: 6 | No. of Views: 905