ENDANGERED INFORMATION COMBINATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE OCCURRENCE OF COLLUSION ATTACKS

Menta Vijaya Bhaskar, Panditi Sravan Kumar

Abstract


Iterative filtering algorithms hold great promise for this sort of purpose. Because of limited computational power and sources, aggregation of understanding from multiple sensor nodes finished in the aggregating node is generally accomplished by simple way of example averaging. During this paper we show several existing iterative filtering algorithms, while considerably greater quality against collusion attacks in comparison with simple averaging methods, are nonetheless susceptive having a novel sophisticated collusion attack we introduce. However such aggregation is called highly vulnerable to node compromising attacks. Because the performance of small power processors dramatically improves, future aggregator nodes will have a way to performing modern-day data aggregation algorithms, thus making WSN less vulnerable. Thus, ascertaining standing of knowledge and standing of sensor nodes is important for WSN. Such algorithms concurrently aggregate data from multiple sources and provide trust assessment of people sources, usually in a kind of corresponding weight factors utilized on data supplied by each source. To handle this security issue, we advise an apparent difference for iterative filtering techniques by providing a preliminary approximation for such algorithms which makes them not just collusion robust, but in addition better and faster converging.


Keywords


Wireless Sensor Networks; Robust Data Aggregation; Collusion Attacks;

References


M. Li, D. Ganesan, and P. Shenoy, “PRESTO: Feedback-driven data management in sensor networks,” in Proc. 3rd Conf. Netw. Syst. Des. Implementation, vol.3, 2006, pp. 23–23.

C. T. Chou, A. Ignatovic, and W. Hu, “Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 8, pp. 1525–1534, Aug. 2013.

E. Ayday, H. Lee, and F. Fekri, “An iterative algorithm for trust and reputation management,” Proc. IEEE Int. Conf. Symp. Inf. Theory, vol. 3, 2009, pp. 2051–2055.

H.-L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, “Energy efficient and fault tolerant multicore wireless sensor network: E2MWSN,” in Proc. 7th Int. Conf. Wireless Commun., Netw. Mobile Comput., 2011, pp. 1–4.

L. Wasserman, All of Statistics : A Concise Course in Statistical Inference. New York, NY, USA: Springer,.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.