Download Secure Data Aggregation In Wireless Sensor Networks - eBooks (PDF)

Secure Data Aggregation In Wireless Sensor Networks


Secure Data Aggregation In Wireless Sensor Networks
DOWNLOAD

Download Secure Data Aggregation In Wireless Sensor Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Secure Data Aggregation In Wireless Sensor Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page



Secure Data Aggregation In Wireless Sensor Networks


Secure Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Hani Mohammed Alzaid
language : en
Publisher:
Release Date : 2011

Secure Data Aggregation In Wireless Sensor Networks written by Hani Mohammed Alzaid and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2011 with categories.




Secure Data Aggregation In Wireless Sensor Networks


Secure Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Sankardas Roy
language : en
Publisher:
Release Date : 2008

Secure Data Aggregation In Wireless Sensor Networks written by Sankardas Roy and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Computer security categories.


Wireless sensor networks have proved to be useful in several applications, such as environment monitoring and perimeter surveillance. In a large sensor network, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multi-path routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., Count, Sum) in spite of message losses resulting from node and transmission failures. However, this aggregation framework does not address the problem of false sub-aggregate values contributed by compromised nodes resulting in large errors in the aggregate computed at the base station, which is the root node in the aggregation hierarchy. This is an important problem since sensor networks are highly vulnerable to node compromises due to the unattended nature of sensor nodes and the lack of tamper-resistant hardware. In this dissertation, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub-aggregate values. In particular, we present two classes of algorithms to securely compute Count or Sum. First, we propose a lightweight verification algorithm which enables the base station to determine if the computed aggregate includes any false contribution. Second, we present attack-resilient computation algorithms which can be used to compute the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy. Thorough theoretical analysis and extensive simulation study show that our algorithms outperform other existing approaches. This dissertation also addresses the security issues of in-network computation of Median and presents verification algorithms and attack-resilient computation algorithms to securely compute an approximate estimate of this aggregate. To the best of our knowledge, prior to this dissertation there was no other work related to the security of in-network computation of Median. We evaluate the performance and cost of our algorithms via both analysis and simulation. The results show that our approach is scalable and efficient.



Secure And Private Data Aggregation In Wireless Sensor Networks


Secure And Private Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Gelareh Taban
language : en
Publisher:
Release Date : 2008

Secure And Private Data Aggregation In Wireless Sensor Networks written by Gelareh Taban and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with categories.




Security Data Aggregation In Wireless Sensor Networks


Security Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Hani Alzaid
language : en
Publisher:
Release Date : 2011

Security Data Aggregation In Wireless Sensor Networks written by Hani Alzaid and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2011 with Computers categories.


Security Data Aggregation in Wireless Sensor Networks.



Secure Data Aggregation Using Fuzzy Logic In Wireless Sensor Networks


Secure Data Aggregation Using Fuzzy Logic In Wireless Sensor Networks
DOWNLOAD
Author : A Babu Karuppiah
language : en
Publisher: Independently Published
Release Date : 2020-07-20

Secure Data Aggregation Using Fuzzy Logic In Wireless Sensor Networks written by A Babu Karuppiah and has been published by Independently Published this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-07-20 with categories.


Wireless Sensor Networks have numerous nodes with limited energy in a particular area. One of the major issues in WSN is increasing the network life time. Secure data aggregation is a challenging task in Wireless Sensor Network. This issue needs to be overcome using efficient technique. An energy efficient scheme needs to be proposed to detect the shortest path for data transmission using fuzzy logic. The Sensor Nodes death frustrates and the problem gets aggravated if the cluster node fails. When a cluster node fails because of energy depletion an alternative cluster needs to be chosen for that particular region. In periodical time each sensor node in the cluster should possess the next cluster head re-election based on energy to avoid node failure. In this project a novel technique is proposed using Fuzzy to find the shortest path for data aggregation. It is shown that the proposed technique has improved the throughput with reduced packed drop and also less energy consumption in these networks. The technique is evaluated through NS2.



Energy Efficient Secure And Privacy Preserving Data Aggregation In Wireless Sensor Networks


Energy Efficient Secure And Privacy Preserving Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Irfana Memon
language : en
Publisher:
Release Date : 2013

Energy Efficient Secure And Privacy Preserving Data Aggregation In Wireless Sensor Networks written by Irfana Memon and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2013 with categories.


WSNs are formed by sensor nodes that have the ability to sense the environment, process the sensed information, and communicate via radio without any additional prior backbone infrastructure. In WSNs, communication with other nodes is the most energy consuming task. Hence, the primary objective in designing protocols for WSNs is to minimize communication overhead. This is often achieved using in-network data aggregation. As WSNs are often deployed in open environments, they are vulnerable to security attacks. This thesis contributes toward the design of energy efficient secure and privacy preserving data aggregation protocol for WSNs. First, we classify the main existing secure and privacy-preserving data aggregation protocols for WSNs in the literature. We then propose an energy-efficient secure and privacy-preserving data aggregation (ESPPA) scheme for WSNs. ESPPA scheme is tree-based and achieves confidentiality and privacy based on shuffling technique. We propose a secure tree construction (ST) and tree-reconstruction scheme. Simulation results show that ESPPA scheme effectively preserve privacy, confidentiality, and has less communication overhead than SMART. Finally we propose an extension of ST scheme, called secure coverage tree (SCT) construction scheme. SCT applies sleep scheduling. Through simulations, we show the efficacy and efficiency of the SCT scheme. Beside the work on secure and privacy preserving data aggregation, during my research period, we have also worked on another interesting topic (i.e., composite event detection for WSNs). Appendix B presents a complementary work on composite event detection for WSNs.



Energy Efficient Clustering And Secure Data Aggregation In Wireless Sensor Networks


Energy Efficient Clustering And Secure Data Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Julia Gerda Maria Albath
language : en
Publisher:
Release Date : 2008

Energy Efficient Clustering And Secure Data Aggregation In Wireless Sensor Networks written by Julia Gerda Maria Albath and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Sensor networks categories.


"Communication consumes the majority of a wireless sensor network's limited energy. There are several ways to reduce the communication cost. Two approaches used in this work are clustering and in-network aggregation. The choice of a cluster head within each cluster is important because cluster heads use additional energy for their responsibilities and that burden needs to be carefully distributed. We introduce the energy constrained minimum dominating set (ECDS) to model the problem of optimally choosing cluster heads in the presence of energy constraints. We show its applicability to sensor networks and give an approximation algorithm of O(log n) for solving the ECDS problem. We propose a distributed algorithm for the constrained dominating set which runs in O(log n log [triangle]) rounds with high probability. We show experimentally that the distributed algorithm performs well in terms of energy usage, node lifetime, and clustering time and thus is very suitable for wireless sensor networks. Using aggregation in wireless sensor networks is another way to reduce the overall communication cost. However, changes in security are necessary when in- network aggregation is applied. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted sensor has access to the intermediate data and can falsify results. Additively homomorphic encryption allows for aggregation of encrypted values, with the result being the same as the result as if unencrypted data were aggregated. Using public key cryptography, digital signatures can be used to achieve integrity. We propose a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in- network aggregation in wireless sensor networks. We prove that our digital signature algorithm which is based on Elliptic Curve Digital Signature Algorithm (ECDSA) is at least as secure as ECDSA. Even without in-network aggregation, security is a challenge in wireless sensor networks. In wireless sensor networks, not all messages need to be secured with the same level of encryption. We propose a new algorithm which provides adequate levels of security while providing much higher availability [sic] than other security protocols. Our approach uses similar amounts of energy as a network without security"--Abstract, leaf iv



Secure Data Aggregation And False Data Detection For Wireless Sensor Networks


Secure Data Aggregation And False Data Detection For Wireless Sensor Networks
DOWNLOAD
Author : Suat Ozdemir
language : en
Publisher:
Release Date : 2006

Secure Data Aggregation And False Data Detection For Wireless Sensor Networks written by Suat Ozdemir and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2006 with Sensor networks categories.




Secure Aggregation In Wireless Sensor Networks


Secure Aggregation In Wireless Sensor Networks
DOWNLOAD
Author : Wassim Drira
language : en
Publisher:
Release Date : 2009

Secure Aggregation In Wireless Sensor Networks written by Wassim Drira and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2009 with categories.


The Wireless Sensor Networks (WSNs) are composed of a huge number of sensor nodes. The large number of nodes may lead to a huge amount of data in the network, causing the network to degrade performance and shorten its lifetime. The data aggregation techniques may be a solution to remane the redundancy of data and thereby reduce the number of packets transmitted in the network. Nevertheless, the data aggregation causes some security vulnerabilities: impersonation, denying having received data, dropping packets deliberately, alteration of the sensored readings and aggregation results... In this report, we compare the performances get by two secure aggregation solutions: the Secure Aggregation for Wireless Networks (Hu et al. protocol) and the Secure Aggregation Protocol for Cluster-Based Wireless Sensor Network (SAPC). The analysis shows that Hu et al. protocol gives better performance than SAPC in terms of number of exchanged messages but it is vulnerable to simple attacks. This report describes both protocols and their performances and propose a new protocol based on binary trees and delayed aggregation result checking to improve the performance of SAPC.



Secure Data Aggregation Protocol For Wireless Sensor Network


Secure Data Aggregation Protocol For Wireless Sensor Network
DOWNLOAD
Author : Hamidreza Ghafghazi
language : en
Publisher:
Release Date : 2011

Secure Data Aggregation Protocol For Wireless Sensor Network written by Hamidreza Ghafghazi and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2011 with Wireless sensor networks categories.