Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhancement of Concealed Data Aggregation for Multiple Applications to Prevent Vulnerabilities in Wireless Sensor Networks


Affiliations
1 Birla Institute of Technology (MTech Student, Dept. of Computer Sc. & Engg.) Ranchi, PO-835215, India
2 Birla Institute of Technology, Ranchi, PO-835215, India
     

   Subscribe/Renew Journal


Data Aggregation is an important aspect in Wireless Sensor Networks WSNs and this is because it reduces the amount of data to be transmitted over the network. This is done by either avoiding the transmission of redundant data or aggregating the result from different sensors and forwarding only the aggregated result further to BS. In previous studies authors used homomorphic encryption properties for concealing communication during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not satisfying multi applications which lead to proposal of CDAMA (Concealed Data Aggregation for Multi Applications). It is designed for multi applications, as it provides secure counting capability and also it reduces the effect of compromising secrets of a single application. In wireless sensor networks or environments the sensor nodes are defenseless and are vulnerable to some attacks. Considering the security aspect of wireless environments we have used Dynamic Intrusion Detection Protocol Model (DYDOG) and a modified key generation procedure that uses Digital Signatures and Two Fish Algorithms along with CDAMA for enhancement of security and throughput. To prove our proposed scheme’s robustness and efficiency, we conducted the simulations, comprehensive analysis and comparisons in the end.


Keywords

Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 152

PDF Views: 1




  • Enhancement of Concealed Data Aggregation for Multiple Applications to Prevent Vulnerabilities in Wireless Sensor Networks

Abstract Views: 152  |  PDF Views: 1

Authors

Bharat Bhushan
Birla Institute of Technology (MTech Student, Dept. of Computer Sc. & Engg.) Ranchi, PO-835215, India
G. Sahoo
Birla Institute of Technology, Ranchi, PO-835215, India

Abstract


Data Aggregation is an important aspect in Wireless Sensor Networks WSNs and this is because it reduces the amount of data to be transmitted over the network. This is done by either avoiding the transmission of redundant data or aggregating the result from different sensors and forwarding only the aggregated result further to BS. In previous studies authors used homomorphic encryption properties for concealing communication during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not satisfying multi applications which lead to proposal of CDAMA (Concealed Data Aggregation for Multi Applications). It is designed for multi applications, as it provides secure counting capability and also it reduces the effect of compromising secrets of a single application. In wireless sensor networks or environments the sensor nodes are defenseless and are vulnerable to some attacks. Considering the security aspect of wireless environments we have used Dynamic Intrusion Detection Protocol Model (DYDOG) and a modified key generation procedure that uses Digital Signatures and Two Fish Algorithms along with CDAMA for enhancement of security and throughput. To prove our proposed scheme’s robustness and efficiency, we conducted the simulations, comprehensive analysis and comparisons in the end.


Keywords


Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.