Secure Data Aggregation in Wireless Sensor Networks

被引:0
作者
Vaidehi, V. [1 ]
Kayalvizhi, R. [2 ]
Sekar, N. Chandra [3 ]
机构
[1] Anna Univ, Madras Inst Technol, Dept Elect Ngineering, Madras, Tamil Nadu, India
[2] Anna Univ, Madras Inst Technol, Dept Elect Engn, Madras, Tamil Nadu, India
[3] Anna Univ, Madras Inst Technol, Dept Comp Technol, Madras, Tamil Nadu, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
Encryption; Data aggregation; Security; Wireless sensor network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in WSN. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the WSN. There are various challenges that are involved in the process of data aggregation like checking of duplication of data after encryption, overhead due to encryption etc. The security issues, data confidentiality and integrity in data aggregation become vital when the sensor network is deployed in a hostile environment (eg, battle field). This paper proposes a novel scheme to secure the process of data aggregation by providing a light-weight security scheme called Combinatorial Key Distribution (CKD) mechanism that consumes less power and its performance is improved using hashes of data that is sent across the network. The proposed scheme minimizes the power usage and maximizes the secureness of data in the wireless sensor network. The proposed security scheme is compared with other existing security solutions and the results are reported.
引用
收藏
页码:2179 / 2184
页数:6
相关论文
共 13 条
[1]  
Becker Georg, 2013, THESIS, P16
[2]  
Camtepe Seyit A., 2007, IEEE ACM T NETWORK, V15, P55
[3]  
Chen J.L, 2011, IET COMMUNICATIO JAN, P135
[4]  
Delgosha Fershid, 2009, IEEE T WIREL COMMUN, V8, P23
[5]  
Du Wenliang, 2006, IEEE T DEPEND SECURE, V3, P981
[6]  
Du Xiaojiang, 2008, IEEE J WIRELESS AUG, P769
[7]   Combinatorial optimization of group key management [J].
Eltoweissy M. ;
Heydari M.H. ;
Morales L. ;
Sudborough I.H. .
Journal of Network and Systems Management, 2004, 12 (1) :33-50
[8]  
Kumar Hiren, 2008, IEEE A E SYSTEMS MAG, P120
[9]  
Kwon Taekyong, 2010, IEEE T COMPUT, V59, P528
[10]  
Laih C.S, 2008, IET COMMUNICATIO SEP, P227