Y. Mamatha, Jyothsna Bandreddi


In hierarchical data aggregation a severe safety hazard is originated by node confine attacks, where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks and it makes a high risk of data privacy. For hierarchical data aggregation in wireless sensor networks a securing node capture attacks is proposed in this paper. Each cluster is headed by an aggregator and the aggregators are directly connected to sink as network is separated into number of clusters. To the selected set of nodes in first round of data aggregation, the aggregator by identifying the detecting nodes selects a set of nodes randomly and broadcast an exclusive value which contains their validation keys. To relocate the data when any node within the group needs it transfers portion of data to other nodes in that group this is encrypted by individual validation keys. Each receiving node decrypts, sums up the portions and transfers the encrypted data to the aggregator. The data with the shared secret key of the sink and forwards it to the sink as the aggregator aggregates and encrypts. In the second round of aggregation the set of nodes is reselected with new set of authentication keys. The proposed technique resolves the security threat of node capture attacks is demonstrated by simulation results.


Safe Node, Confine Attacks, Wireless Sensor Networks, Data Privacy, Data Aggregation, Secret Key


Dorottya Vass, Attila Vidacs, ―Distributed Data Aggregation with Geographical Routing in Wireless Sensor Networks‖, Pervasive Services, IEEE International Conference on July 2007.

Jukka Kohonen, ―Data Gathering in Sensor Networks‖, Helsinki Institute for Information Technology, Finland. Nov 2004.

Gregory Hartl, Baochun Li, ―Loss Inference in Wireless Sensor Networks Based on Data Aggregation‖, IPSN 2004.

Zhenzhen Ye, Alhussein A. Abouzeid and Jing Ai, ―Optimal Policies for Distributed Data Aggregation in Wireless Sensor Networks‖, Draft Infocom2007 Paper.

Bhaskar Krishnamachari, Deborah Estrin and Stephen Wicker, ―The Impact of Data Aggregation in Wireless Sensor Networks‖, Proceedings of the 22nd International Conference on Distributed Computing Systems – 2002.

Kai-Wei Fan, Sha Liu, and Prasun Sinha, ―Structure-free Data Aggregation in Sensor Networks‖, IEEE Transactions on Mobile Computing – 2007.

Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan and Naixue Xiong, ―Secure Data Aggregation in Wireless Sensor Networks: A Survey‖, Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006.

Zinaida Benenson, Nils Gedicke, Ossi Raivio, ―Realizing Robust User Authentication in Sensor Networks‖, Workshop on Real-World Wireless Sensor Networks (REALWSN05), June 2005, Stockholm, Sweden.

Patrick Tague and Radha Poovendran, "Modeling Node Capture Attacks in Wireless Sensor Networks", 46th Annual Allerton Conference on Communication, Control, and Computing, September 2008.

Jun-won Ho, ―Distributed Detection of Node Capture Attacks in Wireless Sensor Networks‖, InTech, Dec 2010

Giacomo de Meulenaer, François-Xavier Standaert, ―Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks‖, MOBILIGHT 2010: 229-242

Kui Ren, Wenjing Lou and Yanchao Zhang, ―LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks‖, IEEE Transactions on Mobile Computing, Vol 7, Issue 5, pp 585 – 598, 2008.

K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn- Jones, ―Group Based Secure Communication for Large-Scale Wireless Sensor Networks‖, journal

Bhoopathy V. and R.M.S. Parvathi / International Journal of Engineering Research and Applications (IJERA).

Mr.V.Bhoopathy and R.M.S Parvathi, ―Energy Efficient Secure Data Aggregation Protocol for Wireless Sensor Networks‖, European Journal of Scientific Research, Vol.50 Issue 1, pp.48-58, 2011. [15] Mr.V.Bhoopathy and R.M.S Parvathi, ―Secure Authentication Technique for Data Aggregation in Wireless Sensor Networks‖ Journal of Computer Science, Vol. 8, Issue 2, pp 232-238, 2012.

Yupeng Hu, Yaping Lin, Yonghe Liu, Weini Zeng, Hunan Univ., and Changsha, ―RAS:Robust authentication scheme for filtering false data in wireless sensor networks‖, 15th IEEE International Conference on Networks, (ICON), pp 200 – 205, 2007.

Eldefrawy, M.H. Khan, M.K. Alghathbar, K, ―A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography‖, International conference on anti- counterfeiting security and identification in communication (ASID), pp 1 – 6, 2010.

Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda, Masaki Aida: ―Improvement of Dependability against Node Capture Attacks for Wireless Sensor Networks‖, IEICE Transactions 94-D(1): 19-26 (2011)

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.