Effective Data Aggregation in WSN for Enhanced Security and Data Privacy

نویسندگان

چکیده

The two biggest problems with wireless sensor networks are security and energy usage. In sensing devices, malicious nodes could be found in large numbers. researchers have proposed several methods to find these rogue nodes. To prevent assaults on data transmission, the must secured. Data aggregation aids reducing number of messages transmitted within network, which turn lowers total network consumption. Additionally, when decrypting aggregated data, base station can distinguish between encrypted consolidated analysis based top cryptographic keys. By examining effectiveness this research. solve above problem, system provides a method an efficient cluster agent is preferred pedestal its location at access point availability. network's consumption reduced by selecting effective agent, extending lifespan. cluster's indict compiling for each member node. clustering validates tosses any errors before aggregation. only aggregates confirmed data. provide end-to-end anonymity, ElGamal elliptic curve (ECE) encryption used secure client reassign information en route agent. Only (BS) decrypt Furthermore, ID-based signature utilized enable authenticity. This research presents technique recuperating lost employs cache-based backup search

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

A Novel Data Detection Method for Data Aggregation Security in WSN

Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...

متن کامل

Data Aggregation and Query Processing in WSN

A wireless sensor network (WSN) has a wide range of important applications such as remote environment monitoring , target tracking etc. This has been enabled by the availability of sensors that are smaller, cheaper and intelligent. These sensor nodes are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRG international journal of electrical and electronics engineering

سال: 2022

ISSN: ['2348-8379', '2349-9176']

DOI: https://doi.org/10.14445/23488379/ijeee-v9i11p101