CFP last date
20 January 2025
Reseach Article

Energy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack

by Jagtap Anagha M., Ingle Madhav D.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 13
Year of Publication: 2016
Authors: Jagtap Anagha M., Ingle Madhav D.
10.5120/ijca2016910928

Jagtap Anagha M., Ingle Madhav D. . Energy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack. International Journal of Computer Applications. 146, 13 ( Jul 2016), 31-35. DOI=10.5120/ijca2016910928

@article{ 10.5120/ijca2016910928,
author = { Jagtap Anagha M., Ingle Madhav D. },
title = { Energy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 13 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number13/25460-2016910928/ },
doi = { 10.5120/ijca2016910928 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:23.289667+05:30
%A Jagtap Anagha M.
%A Ingle Madhav D.
%T Energy Efficient Method in Wireless Sensor Network for Securing Compromised Data Aggregation against the Collusion Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 13
%P 31-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to sensors storage capacity limit, communication bandwidth and computation ability WSN has some limitations. Due to this limited resources the amount of data transmission in network should be reduced. Data aggregation is new method for the above purpose. From the present algorithms for data aggregation the efficient is Iterative Filtering (IF) algorithm, which provides trust evaluation to the various sources from where the data aggregation is done. Trust assessment is given as weights, to cure the vulnerability of the fundamental averaging aggregation strategy to the attacks.Iterative filtering algorithms are stronger than the straightforward averaging procedure but they are not competent to deal with the novel advanced attack which exploits the false information through number of compromised nodes. Iterative filtering is improved to oversee novel complex attack by initial trust estimate, which increases the robustness and preciseness of the IF algorithm.Present system considers attack only on cluster members and not on aggregator.The information is transferred to aggregator by cluster members, and at last to the base station, in this process if attack happens on aggregator, present system gets fails.This problem is discovered by considering attacks on both cluster members as well as on aggregator.The aggregator selection method is proposed which elects new aggregator depending upon maximum remaining energy and distance to the base station, when an attack is detected on aggregator. This makes the system more robust against the compromised aggregator node also it saves time and energy compared to the existing system.

References
  1. M. Rezvani, A.r Ignjatovic, E. Bertino, and S. Jha, “SecureData Aggregation Technique for Wireless Sensor Networksin the Presence of Collusion Attacks ”, IEEE transactionson dependable and secure computing, vol. 12, no. 1, january/february 2015.
  2. Y. Zhou, T. Lei, and T. Zhou, “A robust ranking algorithmto spamming,” Europhys. Lett., vol. 94, p. 48002, 2011.
  3. E. Ayday, H. Lee, and F. Fekri, “An iterative algorithm fortrust and reputation management,” Proc IEEE Int. Conf.Symp. Inf. Theory, vol. 3, 2009, pp. 20512055.
  4. R.-H. Li, J. X. Yu, X. Huang, and H. Cheng, “Robustreputation based ranking on bipartite rating networks,” inProc. SIAM Int. Conf. Data Mining, 2012, pp. 612-623.
  5. H.-S. Lim, G. Ghinita, E. Bertino, and M. Kantarcioglu,“A gametheoretic approach for high-assurance of datatrustworthiness in sensor networks,” in Proc. IEEE 28thInt. Conf. Data Eng., Apr. 2012, pp. 1192-1203
  6. S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputationbased framework for high integrity sensor networks,”ACM Trans. Sens. Netw., vol. 4, no. 3, pp. 15:1-15:37, Jun.2008.
  7. X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee, “UsingSensorRanks for in-network detection of faulty readingsin wireless sensor networks,” in Proc. 6th ACM Int. WorkshopData Eng. Wireless Mobile Access, 2007, pp. 1-8.
  8. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan,“Energy-efficient communication protocol for wirelessmicrosensor networks,” in Proceedings of the 33rd AnnualHawaii International Conference on System Siences(HICSS’00), January 2000.
  9. O. Younis and S. Fahmy, “Distributed clustering in adhocsensor networks: a hybrid, energy-efficient approach,”in Proceedings of the 23rd Annual Joint Conference ofthe IEEE Computer and Communications Societies (INFOCOM’04), pp. 629-640, Hong Kong, March 2004.
  10. Suat Ozdemir, Yang Xiao, ”Secure data aggregation in wireless sensor networks: A comprehensive overview,” Computer Networks 53 (2009) 2022-2037.
  11. H.S. Lim, Y.S. Moon, and E. Bertino,”Provenance-based trustworthiness assessment in sensor networks,” in Proc. 7th Int. Workshop Data Manage. Sensor Netw., 2010, pp. 27.
  12. P. Laureti, L. Moret, Y.-C. Zhang, and Y.-K. Yu, ”Information filtering via iterative refinement,” Europhys. Lett., vol. 75, pp. 1006-1012, Sep. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Data Aggregation Iterative Filtering Collusion Attack Trust Reputation.