CFP last date
20 January 2025
Reseach Article

Clustering based Data Collection using Data Fusion in Wireless Sensor Networks

by S.g.santhi, R.ramya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 9
Year of Publication: 2015
Authors: S.g.santhi, R.ramya
10.5120/20364-2569

S.g.santhi, R.ramya . Clustering based Data Collection using Data Fusion in Wireless Sensor Networks. International Journal of Computer Applications. 116, 9 ( April 2015), 21-26. DOI=10.5120/20364-2569

@article{ 10.5120/20364-2569,
author = { S.g.santhi, R.ramya },
title = { Clustering based Data Collection using Data Fusion in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 9 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number9/20364-2569/ },
doi = { 10.5120/20364-2569 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:38.440787+05:30
%A S.g.santhi
%A R.ramya
%T Clustering based Data Collection using Data Fusion in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 9
%P 21-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Clustering is one of the important techniques in Wireless Sensor Networks (WSNs). In this paper introduce Double Cluster Head Model (DCHM) for secure and accurate data fusion in WSNs. Data fusion is used to reduce the traffic load and conserves energy of the sensors. In this clustering technique each cluster has two Cluster Heads (CHs) and they are assuming to be trust. After clustering each sensor nodes needs to maintain a reputation and trust table which is used to find the compromised nodes. Each CH perform the data fusion process independently and its sends the fused data to the base station. In this base station dissimilarity coefficient is computed and compared with threshold value which is preset by the users. If the dissimilarity coefficient exceeds the threshold, the CHs will be added to blacklist, and the CHs must be reelected by the sensor nodes in a cluster. And also feedback is sent from the base station to the reputation and trust system, which can helps to identify and delete the compromised sensor nodes. Through a series of extensive simulations, it can found that the DCHM performed very well in data fusion security and accuracy.

References
  1. Amit Kumar, Dhirendra Srivastav, "Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks. " CS & IT-CSCP 2012.
  2. Seema Bandyopadhyay and Edward J. Coyle, "Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. " IEEE INFOCOM 2003.
  3. Bakhta Meroufel, Ghalem Belalem, "Clustering-based data in ad-hoc networks. " Proceedings ICWIT 2012.
  4. Bhoopendra Singh M Tech, Mr. Gaurav Dubey, "Report on Reputation Based Data Aggregation for Wireless Network. " International Journal of Computational Engineering Research, Volume 03, Issue 6.
  5. Saurabh Ganeriwal,Mani B. Srivastava, "Reputation-based Framework for High Integrity Sensor Networks. " SASN'04, October 25, 2004.
  6. Sanjeev SETIA, Sankardas ROY, "Secure Data Aggregation in Wireless Sensor Networks. " Proceedings ICWIT 2012.
  7. Jyoti Rajput, Naveen Garg, "A Survey on Secure Data Aggregation in Wireless Sensor Network. " International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014.
  8. Ossama Younis, Marwan Krunz, "Node clustering in wireless sensor networks: Recent development and deployement changes. " IEEE Network May 2006.
  9. Suman Banerjee, Samir Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop WirelessNetworks. " Algorithmica, Volume 20,1998.
  10. Jaydip Sen, "A Survey on Reputation and Trust-Based Systems for WirelessCommunication Networks. " ACSC 2008.
  11. Ossama Younis, Marwan Krunz, "Node clustering in wireless sensor networks: Recent development and deployement changes. " IEEE Network, May 2006.
  12. Hani Alzaid, Ernest Foo, Juan Gonzalez Nieto, "Secure Data Aggregation in Wireless SensorNetwork: a survey. " ACSC 2008.
  13. Saurabh Ganeriwal, Laura K. Balzano, "Reputation-based Framework for High Integrity Sensor Networks. " ACM Transactions on Sensor Networks, March 2007.
  14. S. G. Santhi, Dr. K. Venkatachalapathy, "energy consumption based rejoin procedure for cluster tree in 802. 15. 4 sensor networks", International Journal of Scientific & Engineering Research (IJSER), Volume 4, November 2013.
  15. Ramesh Rajgopalan, "Data Aggregation techniques in sensor networks: survey. "Computer science commons 2006.
  16. Selvadurai Selvakennedy, "An Energy-Efficient Clustering Algorithm for Multihop Data Gathering in Wireless Sensor Networks. " Journal of Computers, April 2006.
  17. Audun Jøsang, "The Beta Reputation System. " 15th Bled Electronic Commerce Conference, June 2002.
  18. S. G. Santhi, K. Venkatachalapathy, "Ant based Multiple Cluster Tree Routing for 802. 15. 4 Sensor Networks. " International Journal of Computer Applications (0975 –888), Volume 48, June 2012.
  19. Liu Xiang, Jun Luo, "Compressed Data Aggregation: Energy Efficient and High Fidelity Data Collection. " Proceedings of the 8th IEEE SECON, 2011.
  20. S. G. Santhi, K. Chitralakshmi, "Mobility Based Tree Construction for ZigBee Wireless Networks", International Journal of Computer Science & Engineering Technology (IJCSET). January 2014.
  21. Robert Hummel, Sameera Poduri, Franz Hover, Urbashi Mitra, Guarav Sukhatme, "Mission Design for Compressive Sensing with Mobile Robots", Submitted 2011.
  22. David L. Donoho," Compressed Sensing" IEEE transactions on information theory, Volume 52, April 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Double Cluster Heads clustering data fusion security accuracy threshold.