SECUREROBUST DATA AGGREGATION METHOD FOR WIRELESS SENSOR NETWORK IN THE PRESENCE OF MALICIOUS USER

Authors

  • Uma Angadi*, Dr. G.F Ali Ahammed Author

Keywords:

Collusion Attacks, Data Aggregation, Iterative Filtering Algorithms, Wireless Sensor Network.

Abstract

Wireless sensor Networks (WSN) consists of sensor nodes these sensor nodes have the capability to sense and communicate. The capabilities of these nodes have certain limitations such as limited computational power, memory and communication resources. These wireless sensor networks can be used in many application such as military, disaster management and security. Due to limited resources it is very essential to curtail the amount of data transmission. One of the important techniques in wireless sensor networks is data aggregation. This algorithm it mainly focuses on enhancing the network lifetime and efficencey by gathering and aggregating data in an energy efficient manner. The purpose of this survey is to present a critical overview of different data aggregating algorithm in wireless sensor network. Also discussed the advantages and limitations of various data aggregating algorithm and compared them. And also discuss the which algorithm is used in data aggregation process to give the security for the data during the transmission .by using Iterative filtering algorithm to secure the data and iterative filtering algorithm hold great promise for such an purposes. In wireless sensor network data aggregation is highly vulnerable to node compromising attacks. This paper focuses on different approaches used for the purpose of secure data aggregation and Proposed work mainly concentrated on attacks on both cluster member as well as aggregator.

Downloads

Published

2016-04-30

Issue

Section

Articles