The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: The main objective of this paper is to gather and aggregate data in an efficient manner so that network lifetime is enhanced. Enhanced mechanisms for end-to-end encryption from the sensors to the sink, also termed converge cast traffic, address the concern of reducing both the energy consumption at the sensor nodes and the effect of physical attacks on the nodes. Concealed Data Aggregation provides a good balance between energy-efficiency and security while still allowing data to be processed at the nodes. Methods/Statistical analysis: In this paper, we first outline and discuss the formation of cluster nodes. In these each sensor node is controlled by the Cluster Head (CH) which in turn is controlled by a Base Station (BS). Then, an integrity and authenticity has been enhanced using Mykletun encryption scheme. Findings: To recover, the above issues a novel methodology has been proposed, which provides maximize data integrity and authenticity using Concealed Data Aggregation (CDA). This leads to reduce the transmission overhead and improves the overall lifetime of WSN. Applications/Improvements: We propose a novel approach using homomorphic encryption, Mykletun KeyGen and Boneh Signature Scheme to achieve confidentiality, integrity and availability for secure data aggregation in wireless sensor networks.

Keywords

Base Station (BS), Cluster Head (CH), Concealed Data Aggregation (CDA), Privacy Homomorphism (PH), Sensor Nodes (SNs) ,Wireless Sensor Networks (WSN)
User