Consistent and Protected End-to-End Data Aggregation Using Sceret Distribution in WSNs
Author(s):
U.Jayasree, K.Reddamma
Keywords:
data aggregation , wireless sensorNetworks, sign-shared and sham-share
Abstract
Data aggregation in WSNs (Wireless sensor Networks) can effectively reduce communication overheads and therefore the energy consumption of detector nodes. A WSN must be not solely energy economical, however conjointly secure. Varied attacks could build data aggregation unsecure. We investigate the reliable and secure end to-end data aggregation downside considering selective forwarding attacks and modification attacks in homogenous cluster-based WSNs, and propose two data aggregation approaches. Our approaches, namely, Sign-Share and Sham-Share, use secret sharing and signatures to permit aggregators to combination the data while not understanding the contents of messages and therefore the base station to verify the collective data and retrieve the raw data from the collective data.
Article Details
Unique Paper ID: 145609

Publication Volume & Issue: Volume 4, Issue 10

Page(s): 617 - 621
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews