Secured Assemblage Based Approach for Data Aggregation in Wireless Sensor Networks
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Wireless Sensor Network is the technology for sensing and performing different tasks.
newlineThe benefits of WSNs include health monitoring, military, environmental control and industries etc. Wireless Sensor Networks (WSN), which is composed of several thousands
newlineofsensor nodes capable of sensing, actuating andrelaying the collected information have
newlinemade remarkableimpact everywhere. However, due to un-trustworthy transmission, radio
newlinerange of network, unattended nature of the WSNs, these are prone to malicious users and
newlinephysical attacks. The fundamental requirement of these networks is security. As the data
newlinecollected using wireless sensor networks is highly sensitive, security becomes a crucial
newlineconcernandit poses more severe challenges than in traditional networks. The threats
newlineinclude node outage, passive information gathering, node malfunction, message
newlinecorruption, service denial etc. The development of efficient and effective defense
newlinemechanism to counter these attacks need to be addressed at each and every stage of the
newlinedesign of WSNs.
newlineIn this research work, a security model is proposed which helps in securing the wireless
newlinesensor network. In WSNs, each cluster head performs data aggregation and processes data
newlinefor a whole cluster. Therefore securing the cluster head is an important point to be
newlineconsidered. This research work proposes a method of cluster head rotation by monitoring
newlinethe parameters of cluster head rotation. Genetic algorithm and K-means clustering are
newlineused to form clusters. Cluster Head (CH) is monitored and when it is found infected, it is
newlinereplaced with a healthy node. Another challenge in securing the communication between nodes is key exchange. This work proposes enhanced ECC method for secured key
newlineexchange. Secure data aggregation is an important point as the aggregator nodes need to
newlinebe secured from attacks. The attack can be identified by observing the data pattern sent by nodes. If the pattern is different from the expected pattern, it can be concluded that the node is compromised.