An enhanced security pattern for wireless sensor network

Venu Madhav Kuthadi, Rajalakshmi Selvaraj, Tshilidzi Marwala

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)


Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015
EditorsJyotsna Kumar Mandal, Vikrant Bhateja, Suresh Chandra Satapathy, K. Srujan Raju
PublisherSpringer Verlag
Number of pages11
ISBN (Print)9788132225225
Publication statusPublished - 2016
Event2nd International Conference on Computer and Communication Technologies, IC3T 2015 - Hyderabad, India
Duration: 24 Jul 201526 Jul 2015

Publication series

NameAdvances in Intelligent Systems and Computing
ISSN (Print)2194-5357


Conference2nd International Conference on Computer and Communication Technologies, IC3T 2015


  • Data aggregation
  • False data injecting attack
  • Pattern generation
  • Wireless sensor network

ASJC Scopus subject areas

  • Control and Systems Engineering
  • General Computer Science


Dive into the research topics of 'An enhanced security pattern for wireless sensor network'. Together they form a unique fingerprint.

Cite this