The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


The main objective of this paper is to aggregate the data in a secure way such that the tampering caused by the adversaries can be avoided and these secure authentication mechanisms ensure that the base station does not accept forged aggregation value. Previous data aggregation schemes make sure that base stations do not receive and agree with the false aggregation values. The authentication mechanisms are used to detect malicious nodes. But these mechanisms may not be efficient and they can be easily bypassed by hacking the keys used for encryption. A secure mechanism for aggregating the data has been put forward in which the two stages of verification are performed. In the first stage, Level based scheme is applied as the verification technique at each level. In this scheme, the keys are updated dynamically which enhances the security. Next stage of verification is the encryption of the packets by using its private key. The proposed secure data aggregation mechanism improves the performance and efficiency of the aggregation process. Analysis of experimental results indicates that the performance of the proposed scheme is twice that of the previous schemes.

Keywords

Hierarchical Approach, Level Based Scheme (LBS), Secure Data Aggregation, Verification, Wireless Sensor Network (WSN)
User