TY - GEN
T1 - An enhanced security pattern for wireless sensor network
AU - Kuthadi, Venu Madhav
AU - Selvaraj, Rajalakshmi
AU - Marwala, Tshilidzi
N1 - Publisher Copyright:
© Springer India 2016.
PY - 2016
Y1 - 2016
N2 - Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.
AB - Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.
KW - Data aggregation
KW - False data injecting attack
KW - Pattern generation
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=84945968998&partnerID=8YFLogxK
U2 - 10.1007/978-81-322-2523-2_6
DO - 10.1007/978-81-322-2523-2_6
M3 - Conference contribution
AN - SCOPUS:84945968998
SN - 9788132225225
T3 - Advances in Intelligent Systems and Computing
SP - 61
EP - 71
BT - Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015
A2 - Mandal, Jyotsna Kumar
A2 - Bhateja, Vikrant
A2 - Satapathy, Suresh Chandra
A2 - Raju, K. Srujan
PB - Springer Verlag
T2 - 2nd International Conference on Computer and Communication Technologies, IC3T 2015
Y2 - 24 July 2015 through 26 July 2015
ER -