Secure Data Aggregation in WSN using Iterative Filtering algorithm

被引:0
作者
Choudhari, Ekta [1 ]
Bodhe, Ketan D. [2 ]
Mundada, Snehal M. [1 ]
机构
[1] DYPCOE Akurdi, Dept Comp Enginerring, Pune, Maharashtra, India
[2] PIET, Dept Comp Technol, Nagpur, Maharashtra, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA) | 2017年
关键词
Iterative Filtering; Data aggregation; Wireless sensor network; Collusion attack; SENSOR NETWORKS;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In WSN Aggregation is considered as the most susceptible to node compromising attacks, as wireless sensor networks are not more secured so they are more vulnerable to this type of attacks. For WSN it is essential to check the trustworthiness of the data & reputation of sensor nodes. To handle this issue Iterative Filtering acts as a best option. In Iterative filtering algorithm (IF) the data is aggregated concurrently from multiple sources & IF also render trust assessment of these sources. The trust assessment is in the form of similar weight factors assigned to data supplied by each source. Considering the security as major issue in WSN, In this paper we proposed an advancement for IF method by providing approximation which will make them collusion robust and is converging fast. Advancement in the Iterative Filtering algorithm will enhance the performance of the system with good potential for implementation in WSN, IF algorithm is stretched with novel method for collusion detection & revocation based on an initial approximation of the aggregate values as well as distribution of differences of each sensor readings. The proposed system performance is checked through extensive simulation in C#. The simulation demonstrates the improved results. The RMS value in the graphs for series 2(0.1, 0.18, 0.22, 0.22, 0.22, 0.3, 0.36, 0.38) with standard deviation ranging from 0.5 to 4 shows that the proposed system performance is better as compare to existing system.
引用
收藏
页码:205 / 209
页数:5
相关论文
共 21 条
  • [1] [Anonymous], 2012, P SIAM INT C DAT MIN
  • [2] An Iterative Algorithm for Trust and Reputation Management
    Ayday, Erman
    Lee, Hanseung
    Fekri, Faramarz
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2051 - 2055
  • [3] Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
  • [4] Chen Bee-Chung., 2011, PROC KDD 11, P159
  • [5] de Kerchove C., 2010, SIAM J MATRIX ANAL A, V31
  • [6] Reputation-based framework for high integrity sensor networks
    Ganeriwal, Saurabh
    Balzano, Laura K.
    Srivastava, Mani B.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
  • [7] ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 494 - 510
  • [8] A Survey of Attack and Defense Techniques for Reputation Systems
    Hoffman, Kevin
    Zage, David
    Nita-Rotaru, Cristina
    [J]. ACM COMPUTING SURVEYS, 2009, 42 (01)
  • [9] Information filtering via iterative refinement
    Laureti, P.
    Moret, L.
    Zhang, Y. -C.
    Yu, Y. -K.
    [J]. EUROPHYSICS LETTERS, 2006, 75 (06): : 1006 - 1012
  • [10] Li Ming, 2006, P 3 C NETW SYST DES, V3