首页    期刊浏览 2024年09月16日 星期一
登录注册

文章基本信息

  • 标题:Implementation of Data Aggregation and Authentication in Wireless Sensor Networks
  • 本地全文:下载
  • 作者:S. Chaitanya Rami Reddy ; P. Ravinder Kumar
  • 期刊名称:International Journal of Soft Computing & Engineering
  • 电子版ISSN:2231-2307
  • 出版年度:2012
  • 卷号:2
  • 期号:5
  • 页码:122-126
  • 出版社:International Journal of Soft Computing & Engineering
  • 摘要:Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery and eavesdropping. Sensor nodes can be compromised by intruders and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and degrades the bandwidth utilization [1]. False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying. In this paper it has been assumed that some sensor nodes are selected dynamically as data aggregators and the nodes between two consecutive data aggregators are called forwarding nodes simply because they forward data. To detect false data injected by a data aggregator while performing data aggregation, some neighbouring nodes of the data aggregator (called monitoring nodes) also perform data aggregation and compute MACs for the aggregated data to enable their pair mates to verify the data later. This project presents a Data Aggregation and Authentication protocol, called DAA, to integrate false data detection with data aggregation and confidentiality. To support data aggregation along with false data detection, the monitoring nodes of every data aggregator also conduct data aggregation and compute the corresponding small-size message authentication codes for data verification at their pair mates. This project introduces a data aggregation and authentication protocol (DAA) to provide false data detection and secure data aggregation against up to T compromised sensor nodes, for T>=1. The value of T depends on security requirements, node density, packet size and the amount of tolerable overhead. Microsoft C#.NET programming language is used to implement the Data aggregation and authentication protocol. The front end of the protocol is designed using Visual Studio2005.
  • 关键词:Authentication; Data aggregation; Data;integrity; Network- level security; Sensor networks.
国家哲学社会科学文献中心版权所有