Abstract
Generally, aggregation techniques in Wireless Sensor Networks (WSNs) are defenseless against various attacks. The aggregator and aggregated data has to be secured to assure integrity and confidentiality. In this study, we propose a secure data aggregation technique with reliable nodes using key predicate test protocol for sensor network. This technique specialize some nodes as Reliable nodes (R-nodes) to monitor the process of aggregation. Initially, for each node, a secret key is shared between base station and neighboring nodes. Then, an aggregation tree is constructed for transmitting data to the base station in a hierarchical fashion. The aggregator encrypts the data using secret key and forwards to a level up aggregator in aggregation tree. By enhancing broadcasting feature of R- nodes, the aggregated value is verified for ensuring integrity. As keys are shared between neighboring nodes, the nodes are validated using self-key predicate test. The proposed technique is proved through simulation results. It increases the throughput by reducing the packet drops significantly.
Highlights
Wireless sensor networks: A wireless sensor network is an upcoming technology, which is being given major consideration by the research community
Our technique specialize some nodes as reliable nodes (R-nodes) to verify the process of aggregation
We have presented a secure data aggregation technique with reliable nodes using key predicate test protocol for sensor network
Summary
Wireless sensor networks: A wireless sensor network is an upcoming technology, which is being given major consideration by the research community. Low cost devices constitute the sensor network, which is a self-organizing ad-hoc system. The main operations performed are related to monitoring the physical environment, sensed information processing and result delivery to the particular sink nodes. To perform these tasks, the sensor nodes are powered by the batteries, which are resources of limited energy. Designing an energy efficient protocol for increasing the network lifetime is the major dispute in this energy-constrained system (Cunqing and Tak-Shing, 2008)
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have