Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol

被引:24
作者
Gomathi, S. [1 ]
Krishnan, C. Gopala [1 ]
机构
[1] Francis Xavier Engn Coll, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
Wireless sensor networks (WSN); Secure data aggregation protocol (SDAP); Certificate authority (CA); Malicious node detection;
D O I
10.1007/s11277-020-07291-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks are randomly deployed and responsible for monitoring geographical area wide. In WSN, the aggregation of data is very complex because of its limited power and computing capabilities. Issue in data aggregation is that the data may be passed on malicious node. All the existing data aggregation techniques undergo security issues because of the transfer of large amount of data. In this paper we propose a protocol named Secure Data Aggregation Protocol (SDAP) which identifies the malicious node by providing a logical group in the form of tree topology. In the tree topology the aggregation is formed by aggregating the nodes, which are non-leaf node and high level of trust is required to provide a better approximation and accuracy against the security threats. Thus the data is securely aggregated and the efficiency is achieved in data aggregation.
引用
收藏
页码:1775 / 1790
页数:16
相关论文
共 21 条
[1]  
[Anonymous], 2004, ACM SAS 04
[2]  
[Anonymous], 2012, WIRELESS SENSOR NETW
[3]  
[Anonymous], 1978, Found. Secure Comput.
[4]  
[Anonymous], 18 INT PAR DISTR PRO
[5]   An Iterative Algorithm for Trust and Reputation Management [J].
Ayday, Erman ;
Lee, Hanseung ;
Fekri, Faramarz .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :2051-2055
[6]   Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks [J].
Ben Othman, Soufiene ;
Trad, Abdelbasset ;
Youssef, Habib ;
Alzaid, Hani .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :188-195
[7]  
Cam H, 2003, SENSORS, V2, P732
[8]   Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach [J].
Chang, Jian-Ming ;
Tsou, Po-Chun ;
Woungang, Isaac ;
Chao, Han-Chieh ;
Lai, Chin-Feng .
IEEE SYSTEMS JOURNAL, 2015, 9 (01) :65-75
[9]  
CURIAC DI, 2007, 3 INT C NETW SERV IC
[10]  
Girao J, 2005, IEEE ICC, P3044