We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Trust based Data Aggregation in Wireless Sensor Networks

by Amrutha Mohanan. K, P. Vijayalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 22
Year of Publication: 2013
Authors: Amrutha Mohanan. K, P. Vijayalakshmi
10.5120/13032-9505

Amrutha Mohanan. K, P. Vijayalakshmi . Trust based Data Aggregation in Wireless Sensor Networks. International Journal of Computer Applications. 73, 22 ( July 2013), 8-12. DOI=10.5120/13032-9505

@article{ 10.5120/13032-9505,
author = { Amrutha Mohanan. K, P. Vijayalakshmi },
title = { Trust based Data Aggregation in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 22 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number22/13032-9505/ },
doi = { 10.5120/13032-9505 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:48.595903+05:30
%A Amrutha Mohanan. K
%A P. Vijayalakshmi
%T Trust based Data Aggregation in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 22
%P 8-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The trust based data aggregation scheme is secure and it provides both integrity confidentiality and authenticity for homogeneous and heterogeneous networks and this scheme evaluate the malicious behavior of the nodes. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads can directly aggregate the cipher texts without decryption. In this design an encryption and signature techniques are used and also the base station can recover all sensing data even these data has been aggregated. The base station can perform any aggregation function on them. Without compromising any nodes an attacker can interrupt the network system. The hierarchical trust management protocol detects the malicious behavior of the nodes. It is based on four trust components intimacy, honesty, energy, unselfishness of the nodes. It maintains two levels of trust SN-level trust and CH-level trust

References
  1. Chien-Ming Chen and Yue-Hsun Lin, 2012 "RCDA: Recoverable Concealed data aggregation for data integrity in wireless sensor networks". IEEE Transactions on parallel and distributed systems, vol. 23, no. 4.
  2. J. -Y. Chen, G. Pandurangan, and D. Xu, 2006 "Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 987-1000.
  3. H. Sanli, S. Ozdemir, and H. Cam, 2004 "SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks,"Proc. IEEE 60th Int'l Conf. Vehicular Technology (VTC '04-Fall), vol. 7, pp. 4650-4654.
  4. D. Westhoff, J. Girao, and M. Acharya, 2006 "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431.
  5. C. Castelluccia, E. Mykletun, and G. Tsudik,,2005 "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, pp. 109-117.
  6. E. Mykletun, J. Girao, and D. Westhoff, 2006 "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. , vol. 5, pp. 2288-2295.
  7. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp. 416-432, 2003.
  8. Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho, 2012 " Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust Based Routing and Intrusion Detection," IEEE Transactions On Network And Service Management, Vol. 9, No. 2.
  9. J. H. Cho, A. Swami, and I. R. Chen, 2011 "A survey on trust management for mobile ad hoc networks," IEEE Commun. Surveys Tutorials, vol. 13, no. 4, pp. 562–583.
Index Terms

Computer Science
Information Sciences

Keywords

Data aggregation Wireless sensor networks Homogeneous wireless networks heterogeneous wireless networks