An Efficient Trust based Privacy Preserving Data Aggregation in Wireless Sensor Networks
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Wireless Sensor Network (WSN) is composed of huge number
newlineof battery powered sensor nodes placed in a wide / remote area of
newlineinterest. They are authoritative for pass on the real-time data in
newlinedetermined monitoring environment to the base station, in which, it will
newlinebe processed considerably and examined. WSN is widely used in
newlineweather forecasting, habitat monitoring, agriculture, disaster
newlinemanagement, telemedicine and in military applications.
newlineIn nuclear power plant, WSN is used for loose parts
newlinemonitoring, monitoring of radiation level in the environment, vibration
newlineanalysis of the reactor core and the primary circuits and requires
newlineauthenticity assurance, confidentiality, availability and integrity. In
newlinemilitary, WSN is used for dispersal of commands, Data logistics,
newlineintelligence and observed data from sensors and for supervising their
newlineactivity in isolated areas and strengthening security. Being facilitated
newlinewith suitable sensors, these networks can empower the identification of
newlineenemy force, their migration and evaluation of the movement and their
newlinegrowth.
newlineMajor vulnerabilities in WSN are eavesdropping, spoofing,
newlinemessage integrity, denial of service, geo location and physical
newlinecompromise. Hence it is mandatory to provide end-to-end message
newlinesecurity in WSN. Also, another major concern is the need for energy
newlineconservation in WSN. Though considerable research is carried out in
newlinethis area, a well-organized privacy preserved data aggregation is yet to
newlinebe evolved.
newlineix
newlineThis research work titled An Efficient Trust Based Privacy
newlinePreserving Data Aggregation in Wireless Sensor Networks comes up
newlinewith the development of efficient protocol schemes so as to enrich the
newlinelifetime of the WSNs. A comprehensive study of the overview of
newlineliterature sets out as the foundation for accomplishing familiarity
newlineregarding the appropriate scenario, the problems encountered and the
newlineapplication of the WSNs. Therefore, various methodologies for privacy
newlinepreserving aggregated data are suggested in this work, mainly, Trust
newlinebased Data Aggregation Protocol