Secured Assemblage Based Approach for Data Aggregation in Wireless Sensor Networks

Abstract

Wireless Sensor Network is the technology for sensing and performing different tasks. newlineThe benefits of WSNs include health monitoring, military, environmental control and industries etc. Wireless Sensor Networks (WSN), which is composed of several thousands newlineofsensor nodes capable of sensing, actuating andrelaying the collected information have newlinemade remarkableimpact everywhere. However, due to un-trustworthy transmission, radio newlinerange of network, unattended nature of the WSNs, these are prone to malicious users and newlinephysical attacks. The fundamental requirement of these networks is security. As the data newlinecollected using wireless sensor networks is highly sensitive, security becomes a crucial newlineconcernandit poses more severe challenges than in traditional networks. The threats newlineinclude node outage, passive information gathering, node malfunction, message newlinecorruption, service denial etc. The development of efficient and effective defense newlinemechanism to counter these attacks need to be addressed at each and every stage of the newlinedesign of WSNs. newlineIn this research work, a security model is proposed which helps in securing the wireless newlinesensor network. In WSNs, each cluster head performs data aggregation and processes data newlinefor a whole cluster. Therefore securing the cluster head is an important point to be newlineconsidered. This research work proposes a method of cluster head rotation by monitoring newlinethe parameters of cluster head rotation. Genetic algorithm and K-means clustering are newlineused to form clusters. Cluster Head (CH) is monitored and when it is found infected, it is newlinereplaced with a healthy node. Another challenge in securing the communication between nodes is key exchange. This work proposes enhanced ECC method for secured key newlineexchange. Secure data aggregation is an important point as the aggregator nodes need to newlinebe secured from attacks. The attack can be identified by observing the data pattern sent by nodes. If the pattern is different from the expected pattern, it can be concluded that the node is compromised.

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced