Full Paper View Go Back

An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks

U. Korupolu1 , S. Kartik2 , GK. Chakravarthi3

Section:Review Paper, Product Type: Isroset-Journal
Vol.4 , Issue.3 , pp.26-29, Jun-2016


Online published on Jul 02, 2016


Copyright © U. Korupolu, S. Kartik, GK. Chakravarthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi, “An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.3, pp.26-29, 2016.

MLA Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks." International Journal of Scientific Research in Computer Science and Engineering 4.3 (2016): 26-29.

APA Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi, (2016). An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks. International Journal of Scientific Research in Computer Science and Engineering, 4(3), 26-29.

BibTex Style Citation:
@article{Korupolu_2016,
author = {U. Korupolu, S. Kartik, GK. Chakravarthi},
title = {An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {3},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {26-29},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=279},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=279
TI - An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - U. Korupolu, S. Kartik, GK. Chakravarthi
PY - 2016
DA - 2016/07/02
PB - IJCSE, Indore, INDIA
SP - 26-29
IS - 3
VL - 4
SN - 2347-2693
ER -

1350 Views    1269 Downloads    1187 Downloads
  
  

Abstract :
The basic component in wireless sensor networks (WSNs) is represented by the nodes. The sensor node consumes energy during sensing, processing and transmission. The aggregation of data from multiple sensor nodes which is done at the aggregating node is to be performed by simple method such as averaging. In Wireless sensor network power and energy resources are limited. In this paper the monitoring system and READA technique will be used. The number of sensor nodes can detect simultaneously a single target of interest. Redundant and correlated data are collected. If every node sends data to the base station, energy will be wasted and due to that the network energy will be consume quickly. Redundancy Elimination for Accurate Data Aggregation (READA) uses a grouping and compression mechanism to remove duplicate data in the aggregated set of data to be sent to the base station without losing large accuracy of the final aggregated data. In wireless sensor network, security and energy efficiency issues are found.

Key-Words / Index Term :
Wireless Sensor Networks; Network Lifetime; Collision attack; Data Aggregation techniques

References :
[1]. P. saini, M. Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", IJSR in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015,
[2]. L. Pal, P. Sharma, N. Kaurav, S.L. Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4,2013.
[3]. R. Nathiya, S.G. Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.36-43, 2014.
[4]. H. Singh, "Randomly Generated Algorithms and Dynamic Connections", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.1-4, 2014.
[5]. O. Hiteshreddy, P. Singh, S. Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.37-45, 2015.
[6]. D. Tamrakar, S. Bhattacharya, S. Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.2, 1-5, 2014.
[7]. Md.A. Mushtaque, "Comparative Analysis on Different parameters of Encryption Algorithms for Information Security", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.76-82, 2014.
[8]. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Translation Journal on Magnetics in Japan, Vol. 2, Issue.8, pp.740–741, 1987.
[9]. R. Sharma, Heena Das, S.N. Das, "WSN for Computerized Irrigation System in Tea Gardens", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.26-30, 2016.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation