Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE VULNERABILITIES IN WIRELESS SENSOR NETWORKS

google+
Views: 302                 

Author :  Bharat Bhushan

Affiliation :  Department of Computer Engineering, BIT Mesra, Ranchi

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

Abstract :


Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for multi applications which lead to proposal of Concealed Data Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it provides secure counting ability. In wireless sensor networks SN are unarmed and are susceptible to attacks. Considering the defence aspect of wireless environment we have used DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for augmentation of security and throughput. To prove our proposed scheme’s robustness and effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending

Keyword :  Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.

Journal/ Proceedings Name :  Computer Science & Information Technology

URL :  https://airccj.org/CSCP/vol6/csit65608.pdf

User Name : alex
Posted 09-01-2020 on 15:14:33 AEDT



Related Research Work

  • Understanding The Worldwide Paths Towards The Creation Of True Intelligence For Machines
  • An Advantageous And User-friendly Mobile Program To Benefit Students In Seeking Their Suitable Colleges Through The Use Of Web Scraping, Machine Learning, And Frontend Design
  • An Overview Of Copy Move Forgery Detection Approaches
  • Scaled Quantization For The Vision Transformer

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals