SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 372
Structureless Efficient Data Aggregation and Data Integrity in Sensor
Network
Mrs. Kavita Sunchu1, Prof. Dhainje Prakash2
1M.E. Student, Computer Science and Engineering, Shriram Institute of technology, Maharashtra, India
2Professor, Computer Science and Engineering, Shriram Institute of technology, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Recently, several data aggregation
schemes based on privacy homomorphism
encryption have been proposed and investigated
on wireless sensor networks. These data
aggregation techniques provide higher security
compared with traditional aggregation since
cluster heads (aggregator) can directly aggregate
the cipher texts without decryption; consequently,
transmission overhead. Data aggregation protocol
can reduce the communication cost, so the life time
of sensor network is extended. The structure based
has the overhead in dynamic scenarios for any
event based application. The goal of our work is to
design techniques and protocol that is structure
free and ensure data integrity and aggregation
with low transmission overhead and transmission
cost. Experiment results demonstrate that the
transmission overhead is still reduced even if on
sensing data. Further, the design has been
generalized and adopted in wireless sensor
networks.
Keywords -Privacy Homomorphism encryption,
Sensor Networks, Data Integrity, Data Aggregation,
Structure less.
1. INTRODUCTION
In sensor networks, the communication cost is often
higher than the computation cost. For calculating the
communication cost, in-network data aggregation is
considered an effective technique [3]. The inherent
redundancy in preprocessing data collected from the
sensors can often be removed by in-network data
aggregation. In addition, such operations are also useful
for extracting application specific information from
preprocessing data. To conserve energy for a longer
network lifetime, it is different for the network to support
high incidence in network data aggregation [1]. Sensor
networks have emerged as a popular research area with
the advances in the sensor technology and reductions in
the cost of sensor hardware. Usually sensor networks
contain a huge amount of nodes and provide the global
view of the phenomena observed from monitored area by
combining the local measurements of separate nodes. A
wireless sensor network is a combine network in which
both nodes perform their sensing task and if required, acts
as relay for converting the data of other nodes. The main
traffic flow in a wireless sensor network is from the sensor
nodes to the base station [2]. Optionally, an interest can be
flooded from the user to the sensor nodes in the region of
interest. Nodes can also communicate locally with each
other for sensing tasks, cluster formation and scheduling
active/sleep times of nodes. These networks provide long-
lived and autonomous systems for environmental
monitoring in military operations and life sciences,
tracking vehicles or animals, airport surveillance,
telemedicine and smart home applications. The
transmission limit of the sensor radio is short and data
rate is low due to the limited energy supply of the nodes
based on battery technology [3]. Radio saves considerable
energy as compared to other functional units in sensor
network architecture; therefore it is crucial to prevent
redundant transmissions and collisions. Data storage is
another limiting factor which should be kept in mind
during protocol design for wireless sensor networks.
While hardware technology save energy such as
sleep/idle modes for the radio and memory modules with
separate power controls for each module, if the algorithms
and protocols developed for sensor networks do not
consider these features, the energy savings achieved will
not reach the full extent. The amount of data generated by
sensor nodes can be huge due to the large number of
nodes in the network [8]. Consider the fact that, relay
nodes in the network have the same capacity with the
sensor nodes, relaying overhead on these nodes should be
mitigated as much as possible. Redundant packets which
carry information about the same event with other
packets can be eliminated on their way to the base station.
The data aggregation paradigm is essential for the lifetime
of the network due to the reduced number of broadcast
and collisions. Security in data communication is another
important issue to be considered while designing wireless
sensor networks, as wireless sensor networks may be
deployed in hostile areas such as battlefields. Therefore,
data aggregation protocols should work with the data
communication security protocols, as any collision
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 373
between these protocols might create problems in
network security. In the above PH-based schemes, the
base station receives only the aggregated results [8].
However, it brings two problems. First, the usage of
aggregation functions is constrained. For example, these
techniques only permits cluster heads to perform
additional operations on cipher texts sent by sensors;
therefore, they are ineffective if the base station desires to
query the maximum value of all sensing data. Second, the
base station cannot verify the integrity and authenticity of
each sensing data [8]. These problems seem to be solved if
the base station can receive all sensing data rather than
aggregated results, but this method is in direct
contradiction to the concept of data aggregation—that the
base station obtains only aggregated results. Thus, we
attempt to design an approach that allows the base station
to receive all sensing data but still reduce burden on
transmission.
2. RELATED WORK
In this paper Chien-Ming Chen, Yue-Hsun Lin et al [8],
introduced a concept named Recoverable Concealed Data
Aggregation. In recoverable concealed Data Aggregation, a
base station can recover each sensing data generated by
all sensors even if these data have been aggregated by
cluster heads. With these individual data, two
functionalities are provided. First, the base station can
verify the integrity and authenticity of all Sensing data.
Second, the base station can perform any aggregation
functions on them. Then, they propose two recoverable
concealed data aggregation schemes named recoverable
Concealed Data Aggregation Homogenous and
Recoverable Concealed Data Aggregation Heterogeneous
WSN respectively, but at the cost of transmission cost i.e.
transmitting the sensed data and aggregated data to the
base station. The figure 1 shown below gives the idea
about the aggregated data and the sensed data to the base
station.
Fig-1: Cluster of sensor nodes and base station
broadcasting data.
H. OzgurSanli, SuatOzdemir et al [1], focuses on the work
for confidential data exchange in WSNs that supports data
aggregation. To knowledge this is the first work proposing
a solution for end-to-end encryption under such
circumstances. The proposed solution considers positive
adversaries. In practice, there are several other security
goals that should be accomplished by combining other
mechanisms, e.g. authentication of communicating
sensors, protects from data integrity, and plausibility of
sensed data. The proposals regarding other protection
goals in WSNs especially focus on integrity and plausibility
of sensed data [1].
2.1. Encrypted Data Aggregation
Our design for data aggregation eliminates redundant
sensor readings without using encryption and maintains
data secrecy and privacy during transmission [6]. The
concealed data aggregation for wireless sensor network
with privacy homomorphism is illustrated in figure 2.
Fig -2: Concealed data aggregation for wireless sensor
network with privacy homomorphism.
3. EXISTING SYSTEM.
The existing system is compromised of homogenous
environment and heterogeneous environment, the
construction of above system is given below
3.1 .Construction of Homogenous System
Homogeneous system is composed of four steps: Setup,
Encrypt-Sign, Aggregate, and Verify[8]. The Setup
procedure is to prepare and install necessary secrets for
the Base Station and each sensor. When a sensor decides
to send sensing data to its Cluster Head, it performs
Encrypt-Sign and sends the result to the Cluster Head.
Once the Cluster Head receives all results from its
members, it activates aggregate to aggregate what it
received, and then sends the final results (aggregated
cipher text and signature) to the Base station. The last
procedure is verified. The Base Station first extracts
individual sensing data by decrypting the aggregated
cipher text. After that, the Base Station verifies the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 374
authenticity and integrity of the decrypted data based on
the corresponding aggregated signature.
3.2 Construction of Heterogeneous System
Here, consider another environment, heterogeneous
Wireless sensor network. A concealed data aggregation
scheme for heterogeneous Wireless sensor network has
been proposed however, their techniques do not provide
data integrity and recovery.
3.3 Heterogeneous Scheme
Here, the author tries to fully exploit H-Sensors which
have stronger computing capability [8]. Operations on L-
Sensors could be switched to H-Sensors.
Computation cost on L-Sensors is switched to H-
Sensors, so Encrypt, Aggregate, and Verify [8]. In the Setup
procedure, necessary secrets are loaded to each H-Sensor
and L-Sensor. Intracluster Encrypt procedure involves
when L-Sensors desire to send their sensing data to the
corresponding H-Sensor. In the Intercluster Encrypt
procedure, each H-Sensor aggregates the received data
and then encrypts and signs the aggregated result. In
addition, if an H-Sensor receives cipher texts and
signatures from other H-Sensors on its routing path, it
activates the Aggregate procedure. Finally, the Verify
procedure ensures the authenticity and integrity of each
aggregated result.
3.4 Disadvantages
1. Transmission cost is more since only aggregated results
and the sensed data reach the base station. It would cause
the compromise of the whole cluster.
2. These schemes restrict the data type of aggregation or
cause extra transmission overhead.
3. An adversary can still obtain the sensing data of its
cluster members after capturing a cluster head.
Table 2: Notation Used in Homogenous System and
heterogeneous System
4. PROPOSED SYSTEM.
In addition, H-Sensors can be designed to be tamper-
resistant, so we may allow H-Sensors to store the partial
secret information if required. With these considerations,
We introduce a concept named Structureless
efficient data aggregation and data integrity in sensor
network. In this, a base station can recover each sensing
data generated by all sensors even if these data have been
aggregated by cluster procedures: Setup, Intracluster
Encrypt, and Intercluster heads with transmission
overhead and cost is reduced. With these individual data,
two functionalities are provided. First, the base station can
verify the integrity and authenticity of all sensing data.
Second, the base station can perform any aggregation
functions on them. Then, we propose Structure free
technique that verifies the results of data aggregation and
integrity in WSN respectively. In the security and
scalability analysis, we demonstrate that the proposed
schemes are secure under any attack model. Through
experiments, we show that the performance of our design
is reasonable and affordable [9].
4.1 Advantages
1. Random sampling technique that enables aggregation
queries to not only detects malicious sensors, but also to
tolerate them.
2. Mykletun et al. a data aggregation scheme based on
addition homomorphism public-key encryption. It seems
more secure since every sensor stores only public key.
3. Castelluccia et al. a new PH-based aggregation scheme
to overcome this security problem by generating a
temporal key for each transmission.
5. SECURITY AND SCALABILITY ANALYSIS
5.1 Unsafe aggregation
In these proposals, intermediate nodes decrypt messages
before aggregating them. Since intermediate nodes see the
data they are aggregating, they can compute any
mathematical function on them[11]. However, when an
intermediate node is compromised, the confidentiality of
messages traversing that node becomes compromised too.
Therefore, this kind of schemes only offers protection
against external attackers eavesdropping transmitted
messages.
5.2 Many-to-one security without scalability
Consider the following trivial, non-scalable protocol:
(1) Each leaf Uiencrypts its data under a symmetric key
SKishared with the base station (root). Then, Uisends the
result to its parent (intermediate node).
(2) Internal nodes aggregate the received values by
combination.
(3) The base station receives a combination of encrypted
values from the leaves. Then, it decrypts them and
computes the desired value. This trivial solution provides
privacy and authentication, and it can easily offer integrity
if some redundancy is added. Besides, after decryption, the
Symbol Description
BS Base Station
CH Cluster Head
Homo Homomorphism
Hete Heterogeneous
L-Sensor Low End Sensor
H-Sensor High End Sensor
SN Sensor Node
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 375
base station can compute any mathematical function on
the received data. The main shortcoming of this solution is
that it is a lossless approach instead of a lossy approach.
This situation implies that the base station receives a final
message with O(n) length, n being the number of leaves of
the tree. This cost does not scale well for large values of n.
The figure 2 shown below illustrates the security versus
scalability trade-off between sensor sending the data and
aggregated results to the base station, in which the sensed
data encrypted the results is shown in above analysis and
when encryption is done then our approach is more
secure and scalable and hence the both the transmission
cost and transmission overhead is reduced. Nevertheless it
could be structure less.
Fig -3: Scalability and security Trade off.
III. CONCLUSION
In this paper, we have proposed structure free aggregation
schemes in wireless sensor network which ensures the
security and scalability of the aggregated results of the
base station. A special feature is that the base station can
securely sensing data rather than aggregated results, but
the transmission overhead is still acceptable. Moreover,
we integrate the aggregate signature scheme to ensure
data authenticity and integrity in the design. Even though
signatures bring additional costs, the proposed schemes
are still affordable for WSNs after evaluation.
6.REFERENCES
[1] H. OzgurSanli, SuatOzdemir and Hasan Cam,
“SRDA: Secure Reference-Based Data Aggregation
Protocol for Wireless Sensor Networks”,
Department of Computer Science and Engineering
Arizona State University.
[2] HasanÇama,, SuatÖzdemira, PrashantNairb,
DevasenapathyMuthuavinashiappana and H.
OzgurSanlia ,“Energy-Efficient Secure Pattern
Based Data Aggregation for Wireless Sensor
Networks”, Department of Computer Science and
Engineering a, Department of Electrical
Engineering Ira A. Fulton School of Engineering,
Arizona State University, Tempe, AZ 85287, USA.
[3] KarthikeyanVaidyanathan, Sayantan Sur,
SundeepNarravula, PrasunSinha, “Data
Aggregation Techinques in Sensor Networks”,
Technical Report OSU-CISRC-11/04-TR60
[4] Joao Girao , Dirk Westhoff , Markus Schneider
“CDA: Concealed Data Aggregation for Reverse
Multicast Traffic in Wireless Sensor Networks”,
NEC Europe Ltd. 69115 Heidelberg, Germany.
[5] M.NesasudhaandM.L.Valarmathi ,“An Energy
efficient data transmission in Wireless Sensor
Networks”, International Journal of Recent Trends
in Engineering, Vol 2, No. 3, November 2009.
[6] HevinRajesh, D. , B. Paramasivan, “Fuzzy Based
Secure Data Aggregation Technique in Wireless
Sensor Networks”, Journal of Computer Science,
2012
[7] Samuel Madden, Michael J. Franklin, and Joseph
M. Hellerstein Wei Hong ,“TAG: a Tiny
AGgregation Service for Ad-Hoc Sensor
Networks”, Appearing in 5th Annual Symposium
on Operating Systems Design and Implementation
(OSDI). December, 2002.
[8] Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and
Hung-Min Sun, “RCDA: Recoverable Concealed
Data Aggregation for Data Integrity in Wireless
Sensor Networks”, IEEE Transactions On Parallel
And Distributed Systems, Vol. 23, No. 4, April
2012.
[9] Jen-Yeu Chen, GopalPandurangan ,DongyanXu ,
“Robust and Distributed Computation of
Aggregates in Wireless Sensor
Networks”,Computer Science Technical Reports
2004.
[10] Kai-Wei Fan, Sha Liu, and PrasunSinha “Structure-
free Data Aggregation in Sensor Networks”,
Department of Computer Science and Engineering
The Ohio State University, Columbus.
[11] Alexandre Viejo, Qianhong Wu, Josep Domingo-
Ferrer “Asymmetric Homomorphisms for Secure
Aggregation in Heterogeneous Scenarios”,Preprint
submitted to Elsevier Preprint 8 November 2010.
[12] Bronis R. de Supinski, Rob Fowler, Todd Gamblin,
Frank Mueller, PrasunRatn, Martin Schulz ,“An
Open Infrastructure for Scalable, Reconfigurable
Analysis”, International Workshop on Scalable
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 376
Tools for High-End Computing (STHEC), May 16,
2008.
[13] AmitManjhi, AnastassiaAilamaki, Bruce M. Maggs,
Todd C. Mowry, Christopher Olston, Anthony
Tomasic, “Simultaneous Scalability and Security
for Data Intensive Web
Applications”,ACM.SIGMOD Chicago, Illinois,
USA.Copyright 2006.
[14] R. Rajagopalan and P. Varshney, “Data-
Aggregation Techniques in Sensor Networks: A
Survey,” IEEE Comm. Surveys Tutorials, vol. 8, no.
4, pp. 48-63, Oct.-Nov. 2006.
BIBLIOGRAPHIES
Mrs. Kavita Sunchu had B.E from
BIGCE ,Solapur University,Solapur.
She is a M.E. Student in CSE
Departmentof SEIT,Solapur
University,She is currently working
for her M.E. Research project work
under the guidance of Mr. Prakash
Dainje.Her area of interest include Network Security,Web
Designing.
Prof. Dhainje Prakash Bhagwan had is
B.E.(Comp.Engg) from PVG’s COET
Pune, Pune University and M.B.A (IT)
EIILM University and also M.Tech (IT)
KSOU. Currently he is pursuing his
Ph.D(CSE) from Bundelkhand
University, Jhansi and he is currently
working as Assistant Professor in CSE Department of SIET
college of Engineering, Solpaur.
.

Contenu connexe

Tendances

An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksIRJET Journal
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor networksarathanjabam
 
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...IRJET Journal
 
A Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSNA Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSNIRJET Journal
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
 
Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...IAEME Publication
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...IJECEIAES
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocoleSAT Journals
 

Tendances (20)

An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor Networks
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
 
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
 
A Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSNA Review on Various Energy Efficient Routing Protocols in WSN
A Review on Various Energy Efficient Routing Protocols in WSN
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
50120140506010
5012014050601050120140506010
50120140506010
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
 
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksA Survey of Fault Tolerance Methods in Wireless Sensor Networks
A Survey of Fault Tolerance Methods in Wireless Sensor Networks
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 

Similaire à Structureless Data Aggregation Ensures Integrity

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSEditor IJCTER
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkIRJET Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTPSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTIRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 

Similaire à Structureless Data Aggregation Ensures Integrity (20)

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTPSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Dernier (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Structureless Data Aggregation Ensures Integrity

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 372 Structureless Efficient Data Aggregation and Data Integrity in Sensor Network Mrs. Kavita Sunchu1, Prof. Dhainje Prakash2 1M.E. Student, Computer Science and Engineering, Shriram Institute of technology, Maharashtra, India 2Professor, Computer Science and Engineering, Shriram Institute of technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation techniques provide higher security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead. Data aggregation protocol can reduce the communication cost, so the life time of sensor network is extended. The structure based has the overhead in dynamic scenarios for any event based application. The goal of our work is to design techniques and protocol that is structure free and ensure data integrity and aggregation with low transmission overhead and transmission cost. Experiment results demonstrate that the transmission overhead is still reduced even if on sensing data. Further, the design has been generalized and adopted in wireless sensor networks. Keywords -Privacy Homomorphism encryption, Sensor Networks, Data Integrity, Data Aggregation, Structure less. 1. INTRODUCTION In sensor networks, the communication cost is often higher than the computation cost. For calculating the communication cost, in-network data aggregation is considered an effective technique [3]. The inherent redundancy in preprocessing data collected from the sensors can often be removed by in-network data aggregation. In addition, such operations are also useful for extracting application specific information from preprocessing data. To conserve energy for a longer network lifetime, it is different for the network to support high incidence in network data aggregation [1]. Sensor networks have emerged as a popular research area with the advances in the sensor technology and reductions in the cost of sensor hardware. Usually sensor networks contain a huge amount of nodes and provide the global view of the phenomena observed from monitored area by combining the local measurements of separate nodes. A wireless sensor network is a combine network in which both nodes perform their sensing task and if required, acts as relay for converting the data of other nodes. The main traffic flow in a wireless sensor network is from the sensor nodes to the base station [2]. Optionally, an interest can be flooded from the user to the sensor nodes in the region of interest. Nodes can also communicate locally with each other for sensing tasks, cluster formation and scheduling active/sleep times of nodes. These networks provide long- lived and autonomous systems for environmental monitoring in military operations and life sciences, tracking vehicles or animals, airport surveillance, telemedicine and smart home applications. The transmission limit of the sensor radio is short and data rate is low due to the limited energy supply of the nodes based on battery technology [3]. Radio saves considerable energy as compared to other functional units in sensor network architecture; therefore it is crucial to prevent redundant transmissions and collisions. Data storage is another limiting factor which should be kept in mind during protocol design for wireless sensor networks. While hardware technology save energy such as sleep/idle modes for the radio and memory modules with separate power controls for each module, if the algorithms and protocols developed for sensor networks do not consider these features, the energy savings achieved will not reach the full extent. The amount of data generated by sensor nodes can be huge due to the large number of nodes in the network [8]. Consider the fact that, relay nodes in the network have the same capacity with the sensor nodes, relaying overhead on these nodes should be mitigated as much as possible. Redundant packets which carry information about the same event with other packets can be eliminated on their way to the base station. The data aggregation paradigm is essential for the lifetime of the network due to the reduced number of broadcast and collisions. Security in data communication is another important issue to be considered while designing wireless sensor networks, as wireless sensor networks may be deployed in hostile areas such as battlefields. Therefore, data aggregation protocols should work with the data communication security protocols, as any collision
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 373 between these protocols might create problems in network security. In the above PH-based schemes, the base station receives only the aggregated results [8]. However, it brings two problems. First, the usage of aggregation functions is constrained. For example, these techniques only permits cluster heads to perform additional operations on cipher texts sent by sensors; therefore, they are ineffective if the base station desires to query the maximum value of all sensing data. Second, the base station cannot verify the integrity and authenticity of each sensing data [8]. These problems seem to be solved if the base station can receive all sensing data rather than aggregated results, but this method is in direct contradiction to the concept of data aggregation—that the base station obtains only aggregated results. Thus, we attempt to design an approach that allows the base station to receive all sensing data but still reduce burden on transmission. 2. RELATED WORK In this paper Chien-Ming Chen, Yue-Hsun Lin et al [8], introduced a concept named Recoverable Concealed Data Aggregation. In recoverable concealed Data Aggregation, a base station can recover each sensing data generated by all sensors even if these data have been aggregated by cluster heads. With these individual data, two functionalities are provided. First, the base station can verify the integrity and authenticity of all Sensing data. Second, the base station can perform any aggregation functions on them. Then, they propose two recoverable concealed data aggregation schemes named recoverable Concealed Data Aggregation Homogenous and Recoverable Concealed Data Aggregation Heterogeneous WSN respectively, but at the cost of transmission cost i.e. transmitting the sensed data and aggregated data to the base station. The figure 1 shown below gives the idea about the aggregated data and the sensed data to the base station. Fig-1: Cluster of sensor nodes and base station broadcasting data. H. OzgurSanli, SuatOzdemir et al [1], focuses on the work for confidential data exchange in WSNs that supports data aggregation. To knowledge this is the first work proposing a solution for end-to-end encryption under such circumstances. The proposed solution considers positive adversaries. In practice, there are several other security goals that should be accomplished by combining other mechanisms, e.g. authentication of communicating sensors, protects from data integrity, and plausibility of sensed data. The proposals regarding other protection goals in WSNs especially focus on integrity and plausibility of sensed data [1]. 2.1. Encrypted Data Aggregation Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission [6]. The concealed data aggregation for wireless sensor network with privacy homomorphism is illustrated in figure 2. Fig -2: Concealed data aggregation for wireless sensor network with privacy homomorphism. 3. EXISTING SYSTEM. The existing system is compromised of homogenous environment and heterogeneous environment, the construction of above system is given below 3.1 .Construction of Homogenous System Homogeneous system is composed of four steps: Setup, Encrypt-Sign, Aggregate, and Verify[8]. The Setup procedure is to prepare and install necessary secrets for the Base Station and each sensor. When a sensor decides to send sensing data to its Cluster Head, it performs Encrypt-Sign and sends the result to the Cluster Head. Once the Cluster Head receives all results from its members, it activates aggregate to aggregate what it received, and then sends the final results (aggregated cipher text and signature) to the Base station. The last procedure is verified. The Base Station first extracts individual sensing data by decrypting the aggregated cipher text. After that, the Base Station verifies the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 374 authenticity and integrity of the decrypted data based on the corresponding aggregated signature. 3.2 Construction of Heterogeneous System Here, consider another environment, heterogeneous Wireless sensor network. A concealed data aggregation scheme for heterogeneous Wireless sensor network has been proposed however, their techniques do not provide data integrity and recovery. 3.3 Heterogeneous Scheme Here, the author tries to fully exploit H-Sensors which have stronger computing capability [8]. Operations on L- Sensors could be switched to H-Sensors. Computation cost on L-Sensors is switched to H- Sensors, so Encrypt, Aggregate, and Verify [8]. In the Setup procedure, necessary secrets are loaded to each H-Sensor and L-Sensor. Intracluster Encrypt procedure involves when L-Sensors desire to send their sensing data to the corresponding H-Sensor. In the Intercluster Encrypt procedure, each H-Sensor aggregates the received data and then encrypts and signs the aggregated result. In addition, if an H-Sensor receives cipher texts and signatures from other H-Sensors on its routing path, it activates the Aggregate procedure. Finally, the Verify procedure ensures the authenticity and integrity of each aggregated result. 3.4 Disadvantages 1. Transmission cost is more since only aggregated results and the sensed data reach the base station. It would cause the compromise of the whole cluster. 2. These schemes restrict the data type of aggregation or cause extra transmission overhead. 3. An adversary can still obtain the sensing data of its cluster members after capturing a cluster head. Table 2: Notation Used in Homogenous System and heterogeneous System 4. PROPOSED SYSTEM. In addition, H-Sensors can be designed to be tamper- resistant, so we may allow H-Sensors to store the partial secret information if required. With these considerations, We introduce a concept named Structureless efficient data aggregation and data integrity in sensor network. In this, a base station can recover each sensing data generated by all sensors even if these data have been aggregated by cluster procedures: Setup, Intracluster Encrypt, and Intercluster heads with transmission overhead and cost is reduced. With these individual data, two functionalities are provided. First, the base station can verify the integrity and authenticity of all sensing data. Second, the base station can perform any aggregation functions on them. Then, we propose Structure free technique that verifies the results of data aggregation and integrity in WSN respectively. In the security and scalability analysis, we demonstrate that the proposed schemes are secure under any attack model. Through experiments, we show that the performance of our design is reasonable and affordable [9]. 4.1 Advantages 1. Random sampling technique that enables aggregation queries to not only detects malicious sensors, but also to tolerate them. 2. Mykletun et al. a data aggregation scheme based on addition homomorphism public-key encryption. It seems more secure since every sensor stores only public key. 3. Castelluccia et al. a new PH-based aggregation scheme to overcome this security problem by generating a temporal key for each transmission. 5. SECURITY AND SCALABILITY ANALYSIS 5.1 Unsafe aggregation In these proposals, intermediate nodes decrypt messages before aggregating them. Since intermediate nodes see the data they are aggregating, they can compute any mathematical function on them[11]. However, when an intermediate node is compromised, the confidentiality of messages traversing that node becomes compromised too. Therefore, this kind of schemes only offers protection against external attackers eavesdropping transmitted messages. 5.2 Many-to-one security without scalability Consider the following trivial, non-scalable protocol: (1) Each leaf Uiencrypts its data under a symmetric key SKishared with the base station (root). Then, Uisends the result to its parent (intermediate node). (2) Internal nodes aggregate the received values by combination. (3) The base station receives a combination of encrypted values from the leaves. Then, it decrypts them and computes the desired value. This trivial solution provides privacy and authentication, and it can easily offer integrity if some redundancy is added. Besides, after decryption, the Symbol Description BS Base Station CH Cluster Head Homo Homomorphism Hete Heterogeneous L-Sensor Low End Sensor H-Sensor High End Sensor SN Sensor Node
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 375 base station can compute any mathematical function on the received data. The main shortcoming of this solution is that it is a lossless approach instead of a lossy approach. This situation implies that the base station receives a final message with O(n) length, n being the number of leaves of the tree. This cost does not scale well for large values of n. The figure 2 shown below illustrates the security versus scalability trade-off between sensor sending the data and aggregated results to the base station, in which the sensed data encrypted the results is shown in above analysis and when encryption is done then our approach is more secure and scalable and hence the both the transmission cost and transmission overhead is reduced. Nevertheless it could be structure less. Fig -3: Scalability and security Trade off. III. CONCLUSION In this paper, we have proposed structure free aggregation schemes in wireless sensor network which ensures the security and scalability of the aggregated results of the base station. A special feature is that the base station can securely sensing data rather than aggregated results, but the transmission overhead is still acceptable. Moreover, we integrate the aggregate signature scheme to ensure data authenticity and integrity in the design. Even though signatures bring additional costs, the proposed schemes are still affordable for WSNs after evaluation. 6.REFERENCES [1] H. OzgurSanli, SuatOzdemir and Hasan Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks”, Department of Computer Science and Engineering Arizona State University. [2] HasanÇama,, SuatÖzdemira, PrashantNairb, DevasenapathyMuthuavinashiappana and H. OzgurSanlia ,“Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks”, Department of Computer Science and Engineering a, Department of Electrical Engineering Ira A. Fulton School of Engineering, Arizona State University, Tempe, AZ 85287, USA. [3] KarthikeyanVaidyanathan, Sayantan Sur, SundeepNarravula, PrasunSinha, “Data Aggregation Techinques in Sensor Networks”, Technical Report OSU-CISRC-11/04-TR60 [4] Joao Girao , Dirk Westhoff , Markus Schneider “CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks”, NEC Europe Ltd. 69115 Heidelberg, Germany. [5] M.NesasudhaandM.L.Valarmathi ,“An Energy efficient data transmission in Wireless Sensor Networks”, International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009. [6] HevinRajesh, D. , B. Paramasivan, “Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks”, Journal of Computer Science, 2012 [7] Samuel Madden, Michael J. Franklin, and Joseph M. Hellerstein Wei Hong ,“TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks”, Appearing in 5th Annual Symposium on Operating Systems Design and Implementation (OSDI). December, 2002. [8] Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks”, IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 4, April 2012. [9] Jen-Yeu Chen, GopalPandurangan ,DongyanXu , “Robust and Distributed Computation of Aggregates in Wireless Sensor Networks”,Computer Science Technical Reports 2004. [10] Kai-Wei Fan, Sha Liu, and PrasunSinha “Structure- free Data Aggregation in Sensor Networks”, Department of Computer Science and Engineering The Ohio State University, Columbus. [11] Alexandre Viejo, Qianhong Wu, Josep Domingo- Ferrer “Asymmetric Homomorphisms for Secure Aggregation in Heterogeneous Scenarios”,Preprint submitted to Elsevier Preprint 8 November 2010. [12] Bronis R. de Supinski, Rob Fowler, Todd Gamblin, Frank Mueller, PrasunRatn, Martin Schulz ,“An Open Infrastructure for Scalable, Reconfigurable Analysis”, International Workshop on Scalable
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 376 Tools for High-End Computing (STHEC), May 16, 2008. [13] AmitManjhi, AnastassiaAilamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic, “Simultaneous Scalability and Security for Data Intensive Web Applications”,ACM.SIGMOD Chicago, Illinois, USA.Copyright 2006. [14] R. Rajagopalan and P. Varshney, “Data- Aggregation Techniques in Sensor Networks: A Survey,” IEEE Comm. Surveys Tutorials, vol. 8, no. 4, pp. 48-63, Oct.-Nov. 2006. BIBLIOGRAPHIES Mrs. Kavita Sunchu had B.E from BIGCE ,Solapur University,Solapur. She is a M.E. Student in CSE Departmentof SEIT,Solapur University,She is currently working for her M.E. Research project work under the guidance of Mr. Prakash Dainje.Her area of interest include Network Security,Web Designing. Prof. Dhainje Prakash Bhagwan had is B.E.(Comp.Engg) from PVG’s COET Pune, Pune University and M.B.A (IT) EIILM University and also M.Tech (IT) KSOU. Currently he is pursuing his Ph.D(CSE) from Bundelkhand University, Jhansi and he is currently working as Assistant Professor in CSE Department of SIET college of Engineering, Solpaur. .