Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks
K.Bhagya Sri, A.Srinivasan "Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V25(2):86-90, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Data Aggregation in moderate hubs (called
aggregator hubs) is a viable methodology for streamlining
utilization of rare assets like data transfer capacity and
vitality in Remote Sensor Networks (WSNs). Then again, insystem
preparing represents an issue for the protection of
the sensor information since individual information of
sensor hubs should be known not aggregator hub before
the collection procedure can be conveyed out. In
utilizations of WSNs, protection protecting information
collection has turn into a critical prerequisite due to
delicate nature of the sensor information. This paper
proposes a conventions and plans for this reason called
CPDA - for completing added substance information
collection in a protection saving way for application in
WSNs. The plan has been very prevalent and surely
understood. Regardless of the popularity of this convention,
it has been found that the convention is powerless against
assault and it is likewise not vitality productive. In this
paper, we first present a brief best in class review on the
present protection protecting information conglomeration
conventions for WSNS. At that point we portray the CPDA
convention and recognize its security weakness. At last, we
exhibit how the convention can be made secure and vitality
productive.
References
[1] T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor
NetworkTechnologies for the Information Explosion Era, Stud.
Comput.Intell.Springer-Verlag, 2010, vol. 278.
[2] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of
Security Issuesin Wireless Sensor Networks,” IEEE Commun.
Surveys Tuts., vol. 8,no. 2, pp. 2–23, 2006.
[3] A. A. Abbasi and M. Younis, “A survey on clustering
algorithms forwireless sensor networks,” Comput. Commun., vol.
30, no. 14-15, pp.2826–2841, 2007.
[4] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
“AnApplication-Specific Protocol Architecture for Wireless
MicrosensorNetworks,” IEEE Trans. Wireless Commun., vol. 1,
no. 4, pp. 660–670,2002.
[5] A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical
Model
for Information Retrieval in Wireless Sensor Networks Using
EnhancedbAPTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst.,
vol. 13, pp.1290–1302, 2002.
[6] S. Yi, J. Heo, Y. Cho et al., “PEACH: Power-efficient and
adaptiveclustering hierarchy protocol for wireless sensor
networks,” Comput.Commun., vol. 30, no. 14-15, pp. 2842–2852,
2007.
[7] K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and
Implementa-tion Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput.Applications, vol. 47, no. 11, pp. 23–28,
2012.
[8] L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACHOn
thesecurity of clustered sensor networks,” Signal Process., vol.
87, pp.2882–2895, 2007.
[9] P. Banerjee, D. Jacobson, and S. Lahiri, “Security and
performanceanalysis of a secure clustering protocol for sensor
networks,” in Proc.IEEE NCA, 2007, pp. 145–152.
[10] K. Zhang, C. Wang, and C. Wang, “A Secure Routing
Protocol forCluster-Based Wireless Sensor Networks Using Group
Key Manage-ment,” in Proc. WiCOM, 2008, pp. 1–5.
[11] S. Sharma and S. K. Jena, “A Survey on Secure Hierarchical
RoutingProtocols in Wireless Sensor Networks,” in Proc. ICCCS,
2011, pp.146–151.
[12] G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in
Ultra-Low Power Public Key Cryptography for Wireless Sensor
Networks,”in Proc. IEEE PerCom Workshops, 2005, pp. 146–150.
[13] W. Diffie and M. Hellman, “New Directions in
Cryptography,” IEEETrans. Inf. Theory, vol. 22, no. 6, pp. 644–
654, 1976.
[14] A. Shamir, “Identity-Based Cryptosystems and Signature
Schemes,” inLect. Notes.Comput. Sc. - CRYPTO, 1985, vol. 196,
pp. 47–53.
[15] D. W. Carman, “New Directions in Sensor Network Key
Management,”Int. J. Distrib. Sens. Netw., vol. 1, pp. 3–15, 2005.
Keywords
wireless sensor network, privacy, data
aggregation, cluster-based private data aggregation
(CPDA); key distribution, collusion attack, malicious node