A Novel Data Detection Method for Data Aggregation Security in WSN
نویسنده
چکیده
Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of sensor network, current data aggregation security schemes are analyzed. The defects of SIA scheme are pointed that it cannot provide data aggregation results with effective message authentication code. So an improved scheme based data integrity for data aggregation security in WSN is presented. First, the improved scheme inherits the idea of SIA, in data filtering and cross-layer verification; Second, it expands the adaptability of SIA protocol from a single-path data filtering protocol to a complete data aggregation security scheme. Meanwhile, improved scheme supports that intermediate nodes can execute data aggregation operation to effectively reduce the transmitting overhead. It is also adaptive for more data aggregation operations, which shows better performance in saving storage resource and energy resource.
منابع مشابه
Collusion attack scenario against for Secure Data Aggregation in WSN
Data aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks in WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputat...
متن کاملA Light-Weighted Data Trust Model in WSN
WSN is often deployed in unattended or even hostile environments. Therefore, providing security in WSN is a major requirement for acceptance and deployment of WSN. Furthermore, establishing trust in a clustered environment can provide numerous advantages. We proposed a light-weighted trust model which consider data aggregation and detailed the data in parameters to depend against attacks. With ...
متن کاملFDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks
Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...
متن کاملIntrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کاملSecurity Challenges of Sensor Network Query Processor in Wireless Sensor Network
Recently, the use of the database paradigm has emerged as a feasible solution to manage data in Wireless Sensor Network (WSN) environments. Various Sensor Network Query Processors (SNQPs) implements in-network declarative query processing that provide data reduction, aggregation, logging, and auditing facilities. These SNQPs view the WSN as a distributed database over which declarative query pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 8 شماره
صفحات -
تاریخ انتشار 2013