Open Access Open Access  Restricted Access Subscription Access

Efficient Sensing of Data when Aggregated with Integrity and Authenticity


Affiliations
1 Vel Tech University, Chennai - 600062, Tamil Nadu, India
 

Background/Objectives: The main objective of this paper is to gather and aggregate data in an efficient manner so that network lifetime is enhanced. Enhanced mechanisms for end-to-end encryption from the sensors to the sink, also termed converge cast traffic, address the concern of reducing both the energy consumption at the sensor nodes and the effect of physical attacks on the nodes. Concealed Data Aggregation provides a good balance between energy-efficiency and security while still allowing data to be processed at the nodes. Methods/Statistical analysis: In this paper, we first outline and discuss the formation of cluster nodes. In these each sensor node is controlled by the Cluster Head (CH) which in turn is controlled by a Base Station (BS). Then, an integrity and authenticity has been enhanced using Mykletun encryption scheme. Findings: To recover, the above issues a novel methodology has been proposed, which provides maximize data integrity and authenticity using Concealed Data Aggregation (CDA). This leads to reduce the transmission overhead and improves the overall lifetime of WSN. Applications/Improvements: We propose a novel approach using homomorphic encryption, Mykletun KeyGen and Boneh Signature Scheme to achieve confidentiality, integrity and availability for secure data aggregation in wireless sensor networks.

Keywords

Base Station (BS), Cluster Head (CH), Concealed Data Aggregation (CDA), Privacy Homomorphism (PH), Sensor Nodes (SNs) ,Wireless Sensor Networks (WSN)
User

Abstract Views: 164

PDF Views: 0




  • Efficient Sensing of Data when Aggregated with Integrity and Authenticity

Abstract Views: 164  |  PDF Views: 0

Authors

G. S. Raj
Vel Tech University, Chennai - 600062, Tamil Nadu, India
M. Thanjaivadivel
Vel Tech University, Chennai - 600062, Tamil Nadu, India
M. Viswanathan
Vel Tech University, Chennai - 600062, Tamil Nadu, India
N. Bindhu
Vel Tech University, Chennai - 600062, Tamil Nadu, India

Abstract


Background/Objectives: The main objective of this paper is to gather and aggregate data in an efficient manner so that network lifetime is enhanced. Enhanced mechanisms for end-to-end encryption from the sensors to the sink, also termed converge cast traffic, address the concern of reducing both the energy consumption at the sensor nodes and the effect of physical attacks on the nodes. Concealed Data Aggregation provides a good balance between energy-efficiency and security while still allowing data to be processed at the nodes. Methods/Statistical analysis: In this paper, we first outline and discuss the formation of cluster nodes. In these each sensor node is controlled by the Cluster Head (CH) which in turn is controlled by a Base Station (BS). Then, an integrity and authenticity has been enhanced using Mykletun encryption scheme. Findings: To recover, the above issues a novel methodology has been proposed, which provides maximize data integrity and authenticity using Concealed Data Aggregation (CDA). This leads to reduce the transmission overhead and improves the overall lifetime of WSN. Applications/Improvements: We propose a novel approach using homomorphic encryption, Mykletun KeyGen and Boneh Signature Scheme to achieve confidentiality, integrity and availability for secure data aggregation in wireless sensor networks.

Keywords


Base Station (BS), Cluster Head (CH), Concealed Data Aggregation (CDA), Privacy Homomorphism (PH), Sensor Nodes (SNs) ,Wireless Sensor Networks (WSN)



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i3%2F130261