Consistent and Protected End-to-End Data Aggregation Using Sceret Distribution in WSNs
Author(s):
U.Jayasree, K.Reddamma
Keywords:
data aggregation , wireless sensorNetworks, sign-shared and sham-share
Abstract
Data aggregation in WSNs (Wireless sensor Networks) can effectively reduce communication overheads and therefore the energy consumption of detector nodes. A WSN must be not solely energy economical, however conjointly secure. Varied attacks could build data aggregation unsecure. We investigate the reliable and secure end to-end data aggregation downside considering selective forwarding attacks and modification attacks in homogenous cluster-based WSNs, and propose two data aggregation approaches. Our approaches, namely, Sign-Share and Sham-Share, use secret sharing and signatures to permit aggregators to combination the data while not understanding the contents of messages and therefore the base station to verify the collective data and retrieve the raw data from the collective data.
Article Details
Unique Paper ID: 145609
Publication Volume & Issue: Volume 4, Issue 10
Page(s): 617 - 621
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024