SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS: FILTERING OUT THE ATTACKERS IMPACT

Authors

  • Dr.S.Selvakumar Assistant Professor, Department of Computer Science, SRM Institute of Science and Technology, Kattankulathur, Chennai, India Author
  • MHL Pradeep B.tech Student, Department of Computer Science, SRM Institute of Science and Technology, Kattankulathur, Chennai, India Author
  • Charan Reddy Y. B.tech Student, Department of Computer Science, SRM Institute of Science and Technology, Kattankulathur, Chennai, India Author

DOI:

https://doi.org/10.61841/vakcg827

Keywords:

Wireless sensor networks, computational power, aggregator centre points

Abstract

At present, due to compelled computational power and imperativeness resources of sensor center points, aggregation of data from various sensor centers done at the gathering center is regularly polished by clear procedures, for instance, averaging. In any case, such an all-out has been known to be significantly feeble against center-point bartering ambushes. Since WSN are ordinarily unattended and without changing safe gear, they are uncommonly weak to such ambushes. In like manner, discovering trust-estimation of data and reputation of sensor center points has gotten fundamentally huge for WSN. As the show of particularly low-power processors essentially improves and their cost is fundamentally diminished, future aggregator center points will be fit for performing progressively refined data all-out computations, which will make WSN less vulnerable against the genuine impact of exchanged off-centers. Iterative counts hold unprecedented assurance for such an explanation. Such figuring simultaneously absolute data from various sources and giving trust assessment of these sources regularly in a kind of relating weight factors allotted to data given by each source. At this moment, show that different existing iterative counts, while basically more energetic against intrigue ambushes than the clear averaging procedures, are everything viewed as susceptive to a novel propelled understanding attack I present. To address this security issue, I propose an improvement for iterative frameworks by giving a basic estimation to such figuring, which makes them interest-worthy yet furthermore progressively precise and snappier combining. I acknowledge that so balanced iterative figuring has a remarkable potential for sending later on WSN. 

Downloads

Download data is not yet available.

References

[1] S. Ozdemir and Y. Xiao, "Secure data assortment in remote sensor orchestrates: A broad chart," Comput.

Netw., vol. 53, no. 12, pp. 2022–2037, Aug. 2009.

[2] L. Wasserman, All of Bits of Knowledge: A Minimal Course in Truthful Deriving. New York: Springer.

[3] A. Jøsang and J. Golbeck, "Troubles for vivacious trust and reputation structures," in Procedures of the 5 th

Universal Workshop on Security and Trust The executives, Holy Person Malo, France, 2009.

[4] K. Hoffman, D. Zage, and C. Nita-Rotaru, "An investigation of ambush and protect strategies for reputation

systems," ACM Comput. Surv., vol. 42, no. 1, pp. 1:1–1:31, Dec. 2009.

[5] R. Roman, C. Fernandez-Gago, J. Lopez, and H. H. Chen, "Trust and reputation structures for remote sensor

frameworks," in Security and Protection in Versatile and Remote Systems Administration, S. Gritzalis, T.

Karygiannis, and C. Skianis, Eds. Troubador Distributing Ltd, 2009, pp. 105–128.

[6] H.- S. Lim, Y.- S. Moon, and E. Bertino, "Provenance-based trustworthiness assessment in sensor

frameworks," in Procedures of the Seventh Worldwide Workshop on Information The executives for

Sensor Systems, ser. DMSN '10, 2010, pp. 2-7.

[7] H.- L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, "Essentiality successful and defect-tolerant multicore

remote sensor arrangement: E2MWSN," in Remote Interchanges, Systems administration and Portable

Registering (WiCOM), 2011 seventh Global Meeting on, 2011, pp. 1–4.

[8] C. de Kerchove and P. Van Dooren, "Iterative isolating in reputation structures," SIAM J. Structure Buttcentric. Appl., vol. 31, no. 4, pp. 1812–1834, Blemish. 2010.

[9] Y. Zhou, T. Lei, and T. Zhou, "A solid situating computation to spamming," CoRR, vol. abs/1012.3793, 2010.

[10] P. Laureti, L. Moret, Y.-C. Zhang, and Y.-K. Yu, "Information isolating by methods for Iterative Refinement," EPL (Europhysics Letters), vol. 75, pp. 1006–1012, Sep. 2006.

[11] Y.- K. Yu, Y.- C. Zhang, P. Laureti, and L. Moret, "Interpreting information from rowdy, overabundance,

and intentionally ruined sources," Physica A Measurable Mechanics and its Applications, vol. 371, pp.

732–744, Nov. 2006.

[12] R.- H. Li, J. X. Yu, X. Huang, and H. Cheng, "Solid reputation-based situating on bipartite rating

frameworks," in SDM'12, 2012, pp. 612–623.

[13] E. Ayday, H. Lee, and F. Fekri, "An iterative estimation for trust and reputation the officials," in Procedures

of the 2009 IEEE all-inclusive gathering on Symposium on Data Hypothesis, Volume 3, ser. ISIT'09,

2009, pp. 2051–2055.

[14] H. Liao, G. Cimini, and M. Medo, "Assessing quality, reputation, and trust in online systems," ArXiv eprints, Aug. 2012.

[15] B.- C. Chen, J. Guo, B. Tseng, and J. Yang, "Customer reputation in a comment rating condition," in

Procedures of the seventeenth ACM SIGKDD overall assembly on Information disclosure and data

mining, ser. KDD '11, 2011, pp. 159–167.

[16] C. T. Chou, A. Ignatovic, and W. Hu, "Successful computation of incredible typical of compressive

identifying data in remote sensor sorts out inside seeing sensor issues," Equal and Conveyed Frameworks,

IEEE Exchanges on, vol. 24, no. 8, pp. 1525–1534, Aug 2013.

[17] Y. Yu, K. Li, W. Zhou, and P. Li, "Trust frameworks in remote sensor frameworks: Assault examination

and countermeasures," Diary of System and PC Applications, vol. 35, no. 3, pp. 867 – 880, 2012,

¡ce:title¿Special Issue on Confided in Figuring and Communications¡/ce:title¿.

[18] H.- S. Lim, G. Ghinita, E. Bertino, and M. Kantarcioglu, "A game-theoretic technique for high-certification

of data trustworthiness in sensor frameworks," in Information Building (ICDE), 2012 IEEE 28th Universal

Meeting on April 2012, pp. 1192–1203.

[19] M. Rezvani, A. Ignjatovic, E. Bertino, and S. Jha, "Secure data gathering framework for remote sensor

masterminds inside seeing trick attacks." School of Software Engineering and Designing, UNSW, Tech.

Rep. UNSW-CSE-TR-201319, July 2013.

[20] D. Wagner, "Solid gathering in sensor frameworks," in Procedures of the second ACM workshop on

Security of uncommonly delegated and sensor frameworks, ser. SASN '04, 2004, pp. 78–87.

[21] "The Intel lab data," informational index available at: http://berkeley. intel-research.net/labdata/, 2004.

[22] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-rotaru, and H. Rubens, "Directing byzantine attacks in uncommonly delegated remote frameworks," Branch of Software Engineering, Johns Hopkins College, Tech, Tech. Rep., 2004.

[23] M. C. Vuran and I. F. Akyildiz, "Spatial relationship-based helpful medium access control in remote sensor frameworks," IEEE/ACM Trans. Netw., vol. 14, no. 2, pp. 316–329, Apr. 2006.

[24] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputationbased framework for high uprightness

sensor frameworks," ACM Trans. Sen. Netw., vol. 4, no. 3, pp. 15:1–15:37, Jun. 2008.

[25] X.- Y. Xiao, W.- C. Peng, C.- C. Hung, and W.- C. Lee, "Using SensorRanks for in-sort out distinguishing

proof of flawed readings in remote sensor frameworks," in Procedures of the 6th ACM all inclusive

workshop on Information working for remote and versatile access, ser. MobiDE '07, 2007, pp. 1–8.

[26] M. Li, D. Ganesan, and P. Shenoy, "Presto: input driven data the board in sensor frameworks," in

Procedures of the third gathering on Organized Frameworks Plan and Execution - Volume 3, ser. NSDI'06,

2006, pp. 23–23.

[27] Y. Sun, H. Luo, and S. K. Das, "A trust-based framework for insufficiency tolerant data aggregate in remote

sight and sound sensor frameworks," IEEE Trans. Dependable Secur. Comput., vol. 9, no. 6, pp. 785–797,

Nov. 2012.

[28] L.- A. Tang, X. Yu, S. Kim, J. Han, C.- C. Hung, and W.- C. Peng, "Tru-Alert: Dependability examination

of sensor sorts out in computerized physical structures," in Procedures of the 2010 IEEE Universal Meeting

on Information Mining, ser. ICDM '10, 2010, pp. 1079–1084.

[29] J.- W. Ho, M. Wright, and S. Das, "ZoneTrust: Quick zone-based centre point deal ID and denial in remote

sensor frameworks using progressive hypothesis testing," Reliable and Secure Processing, IEEE Exchanges

on, vol. 9, no. 4, pp. 494 – 511, july-aug. 2012.

[30] S. Ozdemir and H. C¸ am, "Coordination of false data revelation with data combination and private

transmission in remote sensor frameworks," IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 736–749, Jun.

2010.

[31] H. Chan, A. Perrig, and D. Tune, "Secure different leveled innetwork assortment in sensor frameworks," in

Procedures of the thirteenth ACM Gathering on PC and Correspondences Security, ser. CCS '06. New

York, NY, USA: ACM, 2006, pp. 278–287.

[32] Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: an ensured hopby-ricochet data combination show for sensor frameworks," in MobiHoc, 2006, pp. 356–367.

[33] S. Roy, M. Conti, S. Setia, , and S. Jajodia, "Secure data assortment in remote sensor frameworks," Data Crime scene investigation and Security, IEEE Exchanges on, vol. 7, no. 3, pp. 1040–1052, 2012.

Downloads

Published

31.05.2020

How to Cite

S., S., Pradeep, M., & Y., C. R. (2020). SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS: FILTERING OUT THE ATTACKERS IMPACT. International Journal of Psychosocial Rehabilitation, 24(3), 3673-3681. https://doi.org/10.61841/vakcg827