Technique for Secure Data Aggregation in Wireless Sensor Network

Authors

  • Vaishali P. Latke  Assistant Professor, Department of Computer Engineering, PCCOER, Ravet, Pune, Maharashtra, India
  • Amol N. Dumbare  Assistant Professor, Department of Computer Engineering, PCCOER, Ravet, Pune, Maharashtra, India
  • Jameer G. Kotwal  Assistant Professor, Department of Computer Engineering, PCCOER, Ravet, Pune, Maharashtra, India

Keywords:

Wireless Sensor Networks, Sensor Nodes, Cluster Head, Base Station, Cache Based System, Hop by hop authentication.

Abstract

In wireless sensor the cost of energy is required for performing the operation on node is equal to the sending the single bit of information along with the distance to which it is sending. Therefore, data transmission in wireless sensor network reduce the network lifetime, while broadcasting the data in the sensor network, it is necessary to enhance the network lifetime by reducing the energy consumption. The cluster head is the aggregator node of the cluster which comes in frequent communication with all the cluster members thus requires more energy as compare to other members in the cluster. In the existing system cluster head is selected randomly from the cluster which cuts off that node from the network if not have enough energy hence results in reduced network lifetime of that sensor network. So to overcome this issue, the system introduces a method in which efficient cluster head is selected on the basis of, a distance from the base station and available energy. By selecting the efficient cluster head it consumes the less energy of the sensor network which enhance the network lifetime of the sensor network. The head of the cluster is responsible to aggregate the data from all its cluster members. Before aggregation, cluster head verifies the data and discards the invalid data. Only verified data gets aggregated at the cluster head. Homomorphic encryption scheme is used which encrypt the data and send the encrypted data to the cluster head and only base station can decrypt it to give end to end confidentiality. To provide hop by hop authentication an ID based signature scheme is used. In this paper we introduced the method which recovered the lost data, for this base station checks for the lost data and run the cache based recovery system to recover the data. Finally the result are compared on the basis of distinct parameters like packet drop ratio and energy consumption on jung simulator which shows how our system outperforms the existing one.

References

  1. Kyung-Ah Shim, "A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks”, in IEEE transactions on parallel and distributed systems, vol. 26, NO.8, august 2015.
  2. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
  3. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor network, MobiQuitous ’05,” pp. 1-9, 2005.
  4. C.-M. Chen, Y.-H.Lin, Y.-C.Lin, and H.-M. Sun, “RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 4, pp. 727-734, Apr. 2012.
  5. J. Domingo-Ferrer, “A provably secure additive and multiplicative privacy homomorphism,” in Proc. 5th Int. Conf. Inf. Security, 2002, pp. 471-483.
  6. J. Girao, D. Westhoff, and M. Schneider, “CDA: Concealed data aggregation for reverse multicast traffic wireless sensor networks,” in Proc. IEEE Int. Conf. Commun., 2005, pp. 3044-3049.
  7. E. Mykletun, J. Girao, and D. Westhoff, “Public key based cryptoschemes for data concealment in wireless sensor networks,” in Proc. IEEE Int. Conf. Commun., 2006, pp. 2288-2295.
  8. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proc. Int. Cryptol. Conf. Adv. Cryptol., 1984, pp. 47-53.
  9. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:Attacks and countermeasures,” Ad Hoc Networks, vol. 1,pp. 293-315, 2003.
  10. X. Liu, “Survey on clustering routing protocols in wireless sensornetworks,” Sensors, vol. 12, pp. 11113-11153, 2012.
  11. E. Mykletun, J. Girao, and D. Westhoff, “Public key based cryptoschemesfor data concealment in wireless sensor networks,” inProc. IEEE Int. Conf. Commun., 2006, pp. 2288-2295.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Vaishali P. Latke, Amol N. Dumbare, Jameer G. Kotwal, " Technique for Secure Data Aggregation in Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.150-156, January-February-2018.