Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE VULNERABILITIES IN WIRELESS SENSOR NETWORKS

google+
Views: 359                 

Author :  Bharat Bhushan

Affiliation :  Department of Computer Engineering, BIT Mesra, Ranchi

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

Abstract :


Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for multi applications which lead to proposal of Concealed Data Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it provides secure counting ability. In wireless sensor networks SN are unarmed and are susceptible to attacks. Considering the defence aspect of wireless environment we have used DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for augmentation of security and throughput. To prove our proposed scheme’s robustness and effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending

Keyword :  Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.

Journal/ Proceedings Name :  Computer Science & Information Technology

URL :  https://airccj.org/CSCP/vol6/csit65608.pdf

User Name : alex
Posted 09-01-2020 on 15:14:33 AEDT



Related Research Work

  • Conditional Control Flow Statement: “even If”
  • Geometric And Statistical Modeling Of Large-scale Spatial Similarity Using Fibonacci-based Metrics A Case Study Of Terrestrial And Celestial Point Networks
  • The User-centered Iterative Design Of An Llm-powered Educational Scenario Simulator For Clinical Reasoning
  • An Algorithm For Solving Linear Optimization Problems Subjected To The Intersection Of Two Fuzzy Relational Inequalities Defined By Frank Family Of T-norms

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals