Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Reliable Data Collection Method for Remote Sensor Systems in the Vicinity of Collusion Assaults


     

   Subscribe/Renew Journal


Because of constrained computational power and vitality assets, collection of information from different sensor nodes done at the base aggregating node is normally done by basic techniques like averaging. Nevertheless, such aggregation is known to be highly prone to node compromising attacks. Since WSN are generally neglected and without tinker resistant hardware, they are very much prone to such assaults. Thus, deciding believability of data and reputation or of sensor nodes is essential for WSN. As the execution of low power processors considerably enhances, future aggregator nodes will be equipped for performing more advanced and complex data accumulation algorithms, therefore making prone. Iterative filtering algorithms hold guarantee for such a reason. These algorithms consequently collect data from different sources and give trust appraisal of these sources, as a type of corresponding weight components allotted to information gave by every source. Through this paper, I exhibit that few existing iterative filtering algorithms, while fundamentally more robust and resilient against collusive assaults than the straightforward averaging strategies, are nevertheless prone to a novel advanced assault presented. For addressing the security thing, an improvement is proposed for iterative strategies by giving an underlying guess to such calculations which is making them not just collusion resilient, additionally more exact and speedier uniting or converging.


Keywords

Constrained Computational Power, Vitality Assets, Averaging, Compromising Attacks, Tinker Resistant Hardware, Resilient, WSN, Iterative Filtering Algorithms, Assaults
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 232

PDF Views: 0




  • Reliable Data Collection Method for Remote Sensor Systems in the Vicinity of Collusion Assaults

Abstract Views: 232  |  PDF Views: 0

Authors

Abstract


Because of constrained computational power and vitality assets, collection of information from different sensor nodes done at the base aggregating node is normally done by basic techniques like averaging. Nevertheless, such aggregation is known to be highly prone to node compromising attacks. Since WSN are generally neglected and without tinker resistant hardware, they are very much prone to such assaults. Thus, deciding believability of data and reputation or of sensor nodes is essential for WSN. As the execution of low power processors considerably enhances, future aggregator nodes will be equipped for performing more advanced and complex data accumulation algorithms, therefore making prone. Iterative filtering algorithms hold guarantee for such a reason. These algorithms consequently collect data from different sources and give trust appraisal of these sources, as a type of corresponding weight components allotted to information gave by every source. Through this paper, I exhibit that few existing iterative filtering algorithms, while fundamentally more robust and resilient against collusive assaults than the straightforward averaging strategies, are nevertheless prone to a novel advanced assault presented. For addressing the security thing, an improvement is proposed for iterative strategies by giving an underlying guess to such calculations which is making them not just collusion resilient, additionally more exact and speedier uniting or converging.


Keywords


Constrained Computational Power, Vitality Assets, Averaging, Compromising Attacks, Tinker Resistant Hardware, Resilient, WSN, Iterative Filtering Algorithms, Assaults