Detection of packet - dropping attack in recoverable concealed data aggregation protocol for homogeneous wireless sensor networks

被引:0
作者
Kaur, Amandeep [1 ]
Sran, Sukhwinder Singh [1 ]
机构
[1] Yadawindra Coll Engn, Dept Comp Engn, Talwandi Sabo, Punjab, India
来源
2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015 | 2015年
关键词
Secure data aggregation; Homogeneous wireless sensor networks; Packet-dropping attack; Sniffer mode;
D O I
10.1109/ACCT.2015.102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, communication cost is higher as compared to computational cost, so it is important to minimize the amount of data transmission to extend the network lifetime. To minimize the volume of data to be transmitted, data aggregation is mostly used. As sensor nodes are being deployed in remote and unattented environments, they are prone to node compromise attacks and various other security issues. Hence, it is mandatory that data aggregation protocols must be designed by considering security issues on priority basis. Although, there is a trade-off between data aggregation and security of data, but both aspects are essential. Therefore it is challenging task to maintain data aggregation along with security in these networks. Recoverable Concealed Data aggregation Protocol for Homogeneous wireless sensor networks provides both security as well as aggregation. Despite of its strong security mechanism, this protocol is prone to Packet dropping attacks. This paper aims at detection of packet-dropping attack in Recoverable Concealed Data aggregation Protocol for Homogeneous wireless sensor networks.
引用
收藏
页码:666 / 670
页数:5
相关论文
共 19 条
[1]  
Alzaid Hani, 2008, 08 P 6 AUSTR C INF S, V81, P93
[2]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
[Anonymous], COMPUTER COMMUNICATI
[4]   Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks [J].
Bahi, Jacques M. ;
Guyeux, Christophe ;
Makhoul, Abdallah .
2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, :472-477
[5]  
Bekara C, 2007, INT CONF NEXT GEN, P267
[6]   Detection of selective forwarding attacks in heterogeneous sensor networks [J].
Brown, Jeremy ;
Du, Xiaojiang .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1583-1587
[7]   RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks [J].
Chen, Chien-Ming ;
Lin, Yue-Hsun ;
Lin, Ya-Ching ;
Sun, Hung-Min .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) :727-734
[8]   Privacy-preserving robust data aggregation in wireless sensor networks [J].
Conti, Mauro ;
Zhang, Lei ;
Roy, Sankardas ;
Di Pietro, Roberto ;
Jajodia, Sushil ;
Mancini, Luigi Vincenzo .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) :195-213
[9]   A novel intrusion detection framework for wireless sensor networks [J].
Farooqi, Ashfaq Hussain ;
Khan, Farrukh Aslam ;
Wang, Jin ;
Lee, Sungyoung .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) :907-919
[10]   In-network aggregation techniques for wireless sensor networks: A survey [J].
Fasolo, Elena ;
Rossi, Michele ;
Widmer, Jorg ;
Zorzi, Michele .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (02) :70-87