Abstract

Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique.

Highlights

  • Wireless Sensor Networks (WSN) are progressively deployed for applications such as battlefield surveillance applications in military, industrial control applications, wildlife habitat monitoring, healthcare monitoring, forest fire prevention, etc

  • To overcome the security issues in data aggregation, this paper presents a secure data gathering approach using the area based clustering with traffic flow and energy analysis

  • 3) The efficiency of the proposed data aggregation scheme is evaluated by comparing it with the existing secure data aggregation scheme

Read more

Summary

Introduction

WSNs are progressively deployed for applications such as battlefield surveillance applications in military, industrial control applications, wildlife habitat monitoring, healthcare monitoring, forest fire prevention, etc In these applications, the data gathered by sensor nodes from their physical environment require to be assembled at a data sink (base station) for further analysis. The malicious nodes can monitor and inject the false data into the sensor network. If the traffic flow is dramatically increased, it is recognized as the route including the malicious nodes that might include the false data. It needs to be identified and eliminated from the path for secure data aggregation.

Related Works
Network Model
Area Based Clustering
Node Deployment
Cluster Formation
Traffic Analysis
One-Time Key Generation
Signature Verification
Key Generation Procedure
Performance Analysis
Energy Analysis for Data Aggregation
Time Taken for Secure Data Aggregation
False Data Detection
Data Aggregation Accuracy
Alive Nodes Analysis
Findings
Conclusion and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call