Abstract

To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed.Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data aggregation. Hence aggregation process in WSN should be optimized in energy efficient manner. There are some computational technics to implement aggrigation at cluster head and base station.When sensors are deployed at differet locations in wider area, it is possible to compromising attacks by adversaries. false data injected in compromised sensors during data aggregation process which results in false decision making at the Base Station (BS). Simple average data aggregation process is suitable only in attacker free environment.So to filter the false data during data aggregation, induced by the attacker. For every round of data agg.regation need to observe the behavior of nodes.So that it easy to minimize an impact of attacker contribution at the final result.For secure data aggregation process along with trustworthiness estimation using Trust wEighted Secure Data Aggregation algorithm (TESDA). Data aggregation process is optimized by performing aggregation in energy efficient manner through clustering.If the aggregator is compromised, then it affects entire aggregation accuracy. Hence it is necessary to propose a aggregation protocol that is resilient against compromised sensor and compromised aggregator in energy efficient and secure manner.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call