CFP last date
20 January 2025
Reseach Article

Secure Data Aggregation using Efficient Key Management Technique in Wireless Sensor Network

by V. Jayaraj, M. Indhumathi, V. Mathimalar, S. Hemalatha, U. Durai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 9
Year of Publication: 2014
Authors: V. Jayaraj, M. Indhumathi, V. Mathimalar, S. Hemalatha, U. Durai
10.5120/15528-4289

V. Jayaraj, M. Indhumathi, V. Mathimalar, S. Hemalatha, U. Durai . Secure Data Aggregation using Efficient Key Management Technique in Wireless Sensor Network. International Journal of Computer Applications. 89, 9 ( March 2014), 6-11. DOI=10.5120/15528-4289

@article{ 10.5120/15528-4289,
author = { V. Jayaraj, M. Indhumathi, V. Mathimalar, S. Hemalatha, U. Durai },
title = { Secure Data Aggregation using Efficient Key Management Technique in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 9 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number9/15528-4289/ },
doi = { 10.5120/15528-4289 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:46.498423+05:30
%A V. Jayaraj
%A M. Indhumathi
%A V. Mathimalar
%A S. Hemalatha
%A U. Durai
%T Secure Data Aggregation using Efficient Key Management Technique in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 9
%P 6-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Aggregation is an effective technique in Wireless Sensor Network (WSN) because it reduces the number of packets to be sent to sink and increases the lifetime of sensor network by aggregating the similar packets. This technique uses cluster method and clustering has been shown to improve network lifetime, reduce network traffic and the contention for the channel. There are certain drawbacks in the cluster method. The master node is a single point of failure and if a master node fails then the entire sub network fails. To make a WSN successfully operate mater failures or malicious attacks are to be avoided. This paper investigates disparities between mathematical security and practical security in wireless sensor networks. This paper proposes a key exchange management scheme that enables two users for exchanging a key securely and that key can be used for sequent encryption of messages. A Sande–Tukey Algorithm is developed for splitting sensor nodes to provide the key. Especially this technique is used to aggregate the total computation outputs and to identify the total number of failures within the environment.

References
  1. Priyanka Goyal, Dr. Mukesh Kumar, Ritu Sharma A Novel and Efficient dynamic KeyManagement Technique in Wireless SensorNetwork Int. J. Advanced Networking and Applications Volume:04 Issue:01 PP:1462-1466 (2012) ISSN : 0975-0290
  2. He, W. , Liu, X. , Nguyen, H. V. , Nahrstedt, K. , and Abdelzaher, T. 2011. "Privacy-preserving data aggregation for information collection "ACM Transaction Sensor Network. Article 6 (August 2011. DOI = 10. 1145/1993042. 1993048
  3. Tao Shu, Marwan Krunz Sisi Liu, "Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes," IEEE Transactions On Mobile Computing, Vol. 9, No. 7, JULY 2010.
  4. Taehwan Choi H. B. Acharya, The Best Keying Protocol for Sensor Networks, 978-1-4577-0351-5/11/$26. 00 c 2011 IEEE
  5. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia, "Secure Data Aggregation in Wireless Sensor Networks", ieee transactions on information forensics and security, vol. 7, no. 3, june 2012
  6. Angelo Brayner, André L. V. Coelho, Karina Marinho, Raimir Holanda, Wagner Castro, "Information fusion for wireless sensor networks: On query processing in wireless sensor networks using classes of quality of queries", 2012 Elsevier.
  7. Angelo Braynera, Aretusa Lopesa, Diorgens Meiraa, Ricardo Vasconcelosa, Ronaldo Menezesb, "Signal Processing : Toward adaptive query processing in wireless sensor networks" ,Elsevier(87 (2007) 2911–2933.
  8. Deshpande, A, Nath, S. , Gibbons, P. B. , and Seshan, S," Cache-and-query for wide area sensor databases". ACM SIGMOD International Conference on Management of Data. July 2012.
  9. Agrawal r. and srikant, r. "Privacy preserving data mining". ACM SIGMOD Conference on Management of Data. 439–450, June 2012. .
  10. Angelo Brayner, André L. V. Coelho, Karina Marinho, Raimir Holanda, Wagner Castro, "Information fusion for wireless sensor networks: On query processing in wireless sensor networks using classes of quality of queries", 2012 Elsevier.
  11. Intanagonwiwat, C, Govindan, R. , Estrin, D, Heidemann, J, and Silva F, "Directed diffusion for wireless sensor networking". IEEE/ACM Trans. Netw. 11, Jan, 2012.
  12. K. B. Frikken and J. A. Dougherty, "An efficient integrity-preservingscheme for hierarchical sensor aggregation," ACM Conf. Wireless Network Security (WiSec), 2008.
  13. S. Hedetnieme, S. Hedetnieme, A. Liestman, "A survey of gossiping and broadcasting in communication networks", Networks 18 (1988) 319–349.
  14. S. Roy, S. Setia, and S. Jajodia, "Attack-resilient hierarchical data aggregationin sensor networks," in Proc. ACM Workshop Security of Sensor and Adhoc Networks (SASN), 2006.
  15. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia, Secure Data Aggregation in Wireless Sensor Networks, IEEE transactions on information forensics and security, vol. 7, no. 3, June 2012
  16. Y. Zhu, R. Vedantham, S. -J. Park and R. Sivakumar, "A Scalable Correlation Aware Aggregation Strategy for Wireless Sensor Networks," Elsevier Information Fusion, Journal, 2007.
  17. Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia, Secure Data Aggregation in Wireless Sensor Networks, IEEE transactions on information forensics and security, vol. 7, no. 3, June 2012
  18. E. F. Nakamura, A. A. F. Loureiro, A. C. Frery, "Information fusion for wireless sensor networks: methods, models, and classifications", ACM Comput. Survey. 2007.
  19. Deshpande, A, Nath, S. , Gibbons, P. B. , and Seshan, S," Cache-and-query for wide area sensor databases". ACM SIGMOD International Conference on Management of Data. July 2012.
  20. M. Sartipi and F. Fekri, "Distributed Source Coding in Wireless Sensor Networks using LDPC Coding: A Non-uniform Framework," IEEE Data Compression Conference, pp. 477-477, March 2005.
  21. J. Newsome, E. Shi, D. Song, A. Perrig, "The Sybil attack in sensor networks: analysis and defences" IEEE/ACM Information Processing in Sensor Networks (IPSN'04), pp. 259–268, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Traffic Collusion malicious Attack key exchange management Technique New sande tukey Algorithm.