SPY AGENT BASED SECURE DATA AGGREGATION IN WSN



Similar documents
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

Survey on different attacks in Wireless Sensor Networks and their prevention system

Securing MANET Using Diffie Hellman Digital Signature Scheme

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Figure 1. The Example of ZigBee AODV Algorithm

Efficient Data Transmission For Wireless Sensor Networks

Wireless Sensor Network: Challenges, Issues and Research

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Wireless Sensor Networks Chapter 14: Security in WSNs

Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Optimized Load Balancing Mechanism Using Carry Forward Distance

Energy Optimal Routing Protocol for a Wireless Data Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY

Security Sensor Network. Biswajit panja

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *


Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Demystifying Wireless for Real-World Measurement Applications

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Technology White Paper Capacity Constrained Smart Grid Design

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

CHAPTER 1 INTRODUCTION

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

How To Secure Data Aggregation In A Wireless Sensor Network

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Wireless Sensor Network: Improving the Network Energy Consumption

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

Some Security Trends over Wireless Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Introduction to Wireless Sensor Network Security

Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

The Monitoring of Ad Hoc Networks Based on Routing

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Depiction of Body Area Network in Cloud Environment

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

LIST OF FIGURES. Figure No. Caption Page No.

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Energy Efficiency of Load Balancing in MANET Routing Protocols

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

IJMIE Volume 2, Issue 7 ISSN:

Metrics for Detection of DDoS Attacks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

SBSCET, Firozpur (Punjab), India

Design of Remote data acquisition system based on Internet of Things

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

other. A B AP wired network

Transcription:

ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India E-mail: lathiesbhasker@gmail.com 2 Department of Computer Science and Applications, Anna University Chennai, India E-mail: aruljagang@gmail.com Abstract Wireless sensor network consist lot of sensor devices which are activated by using the battery power. These sensor devices are mostly used in hostile environment, military applications etc. So in this type of environment it is highly difficult to collect and transmit the data to the Sink without any data lost. In this paper we proposed SPY Agent based secure data aggregation scheme. Here one SPY Agent moves around the network and monitors the aggregator nodes i.e, the Cluster Heads for secure data collection. In the Simulation section we have analyzed our proposed architecture for both proactive and reactive protocols. Keywords: Wireless Sensor Network (WSN), SPY Agent, Cluster Head (CH), Data Aggregation, Residual Energy 1. INTRODUCTION 1.1 WIRELESS SENSOR NETWORK A wireless sensor network is a group of nodes which forms a cooperative network. Each node has processing capability and different types of memory (program, data and flash memories), have a RF transceiver (usually with a single omni-directional antenna), have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. A wireless sensor network (WSN) contains a Sink (Base Station) that can able to communicate will all the nodes in the network through the radio link. The data (message) can be collected from the sensor nodes then compressed and transmitted to the Sink directly or using the intermediate sensor nodes or gateway nodes [1]. These sensor networks combine the data sensing, data computation and communicate between the data into a single small device. These small sensor nodes have the ability to sense the data, process the data and communication between them. These sensors are small in size so the device has limitations in data storage, battery power and network bandwidth [2] Because of these drawbacks the wireless sensor network differs from normal communication networks in several ways. These limitations requires specialized optimization techniques [3] 1.2 DATA AGGREGATION IN SENSOR NETWORK Data aggregation is one of the basic data processing methods in distributed environment for saving the energy and minimizing the medium access layer contention in sensor network. The important pattern for routing is presented by data aggregation in wireless sensor network. The main concept of data aggregation is collecting the data from different data sources and re-route the data packets to the sink. In data aggregation scheme the data redundancy and optimal energy usage can be achieved. For energy preservation and achieve longer network life time, it is necessary for the network to maintain high incidence of the innetwork data aggregation [4]. 1.3 DATA AGGREGATION IN CLUSTER BASED NETWORK Sensor networks are energy constraint network and large in size. Due to the network size it is inefficient for the sensors to directly transmit the data to the sink. But in the case of Clusterbased approach the entire network is divided into many small groups and each small group selects one Cluster Head among the group members. During the data aggregation process the data are collected by the Cluster Head from the cluster members then this collected data will be sent to the Sink. Because of the direct communication between the cluster heads and the sink reduce more energy consumption and increase the network life time. [5] In recent years lot of cluster based data aggregation protocols such as LEACH, E-LEACH, TL-LEACH, M-LEACH, etc. were proposed [6]. Advantage: The data aggregation process uses to enhance the robustness and increase the data accuracy. With the help of data aggregation the data redundancy can be avoided, the network traffic and energy conservation can be reduced. The data fusion method is a very efficient method for eliminating data redundancy. Disadvantage: In this data aggregation process the aggregator or the cluster head do the data fusion suppose the aggregator node is attacked by the attacker or compromised, then the sink can t get the accurate data. Another disadvantage is existing systems are several copies of the aggregate result may be sent to the receiver (Base Station or Sink) by uncompromised nodes. It increase the power consumed at these nodes [7]. In this Paper we have proposed a SPY agent based secure data aggregation, in this proposed architecture one spy node moves around the entire network and collects the information about the aggregator nodes and updates it s status on the table, based on this updated information the SPY Agent isolates the malicious nodes and the section two explains about the existing methodologies section three explains about the proposed architecture in detail section four shows the simulation result of the proposed methodology and finally section five gives about the conclusion and future enhancement work. 2. RELATED WORK Sung-Hwa Hong et al [8] have proposed a simple clusterbased data aggregation and routing algorithm (SCAR) that 119

T LATHIES BHASKER AND G ARUL JAGAN: SPY AGENT BASED SECURE DATA AGGREGATION IN WSN decreases the incurred overhead during the selection of cluster heads in wireless sensor networks. Preethi Y. R. et al [9] have proposed a Cluster Based Data Routing for In-Network Aggregation that has some key concepts such as a reduced number of messages for setting up a routing tree, maximized number of overlapping routes, high aggregation rate, and reliable data aggregation and transmission. Hiren Thakkar et al [1] have proposed a modification in Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. Their modified protocol is considering residual energy as a criterion for a node to be a cluster head during Cluster head selection and Clusters setup phase. They also have proposed multi level data aggregation among Cluster heads to reduce the packet size which in turn reduces the transmission and receiving energy for a node. They also proposed multi-hop transmission of aggregated data. The data aggregated by Cluster heads will not be transmitted to base station directly but through multi-hop transmission by Cluster heads which are nearer to base station, which in turn reduces the transmission distance and so as energy consumption of nodes. Their main focus to achieve energy efficiency is by reducing packet size by multi level dataaggregation among Cluster heads and by proper selection of nodes as Cluster heads by considering maximum residual energy of a node as a constraint. Nan Guofang et al [11] have proposed an algorithm to select a cluster leader that will perform data aggregation in a partially connected sensor network. The algorithm reduces the traffic flow inside the network by adaptively selecting the shortest route for packet routing to the cluster leader. The algorithm can find a cluster leader in a robust way by using fewer packets than previous work, thus reducing the energy consumption of the sensor network. Amrutha Mohanan. K, et al [12] have proposed an encryption and signature techniques are used and also the base station can recover all sensing data even these data has been aggregated. The base station can perform any aggregation function on them. Without compromising any nodes an attacker can interrupt the network system. The hierarchical trust management protocol detects the malicious behavior of the nodes. It is based on four trust components intimacy, honesty, energy, unselfishness of the nodes. It maintains two levels of trust SN-level trust and CH-level trust. Soubhagya Ranjan Behera et al [13] have proposed a cluster based routing algorithm to ensure high reliability such that the entire network becomes fault tolerant by the introduction of multi cluster heads. Their simulation results shows that the optimal resultant energy of the sensing nodes as a suitable energy retention criterion which makes this scheme more fault tolerant such that a cluster lifetime also is enhanced and is not dependent on a single cluster head. Lathies Bhasker [14] has proposed a genetically derived secure cluster-based data aggregation in WSN. Initially the cluster heads are selected based on the node connectivity, which acts as a data aggregator. Then, the clustering process is executed using the genetic algorithm. When a cluster member wants to transmit the data to aggregator, a data encryption technique are utilized that offers authenticity, confidentiality and integrity. 3. PROPOSED ARCHITECTURE In our proposed method one SPY agent (SA) is used to collect the information about the Cluster Heads (CH). The Following Fig.1 shows the functionality of SPY agent in the sensor network. CH 3.1 SPY AGENT Sink CH Fig.1. Proposed Architecture The SPY Agent (SA) is the key element in our proposed architecture. The SA is a moving agent which moves around the network and monitors the Cluster Head s (CHs) status, CH status means it checks whether the CH is in active state or the CH node has sufficient amount of energy to continue the aggregation process. If any of the above conditions are failed means immediately the SPY Agent actively will participates in Weak CH identification and recovery process. The SPY Agent contains the following fields. Table.1. SPY Agent Fields CH CH ID Life Time (LT) Residual Energy(RE) SA In the above Table.1, CH ID defines the Cluster head identification number. Life Time (LT) defines the total life period of the nodes in the network and Residual Energy defines the nodes energy level value. This life time value is used for finding the next generation Cluster Head nodes from the earlier existing network environment i.e, at the end of previous aggregation process the SA will checks the LT value, if one node or CH has high LT value means that nodes will be chosen as a CH for the next generation. 12

ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 3.2 CLUSTER HEAD FORMATION AND WEAK CLUSTER HEAD IDENTIFICATION 3.2.1 CH Formation: In wireless sensor network each node has some initial energy power (Battery power) and there is some threshold energy (T) level for each node. There is lot of methods are available for selecting Cluster Head from the sensor network environment, In our approach, there is some voting among the sensor nodes taken place each node gives voting to the neighbor nodes, the node which obtained more number of votes elected as Cluster Head (CH). 3.2.2 Weak CH Identification: Finding the Weak Cluster Head and the Cluster Head which was attacked by the malicious nodes will be done by the SPY Agent (SA). The SA in the network moves around the network and checks which are the Cluster Heads has less energy level than the Threshold energy (T) level, if any CH has lesser value means then that CH will mark as weak CH node and the weak node losses its votes then the weak CH become acts as an ordinary cluster member then the other nodes which contains more number of votes and the energy level which is higher than the threshold level will be chosen as new CH. 3.2.3 Residual Energy: The residual energy (RE) of each node (Ni) is calculated by using the following formula. RE = Ei (Etx + Erx + Ea) Where, RE - It is the Residual Energy Ei - Initial Energy of Each node Etx - Energy utilized at the time of transmission Erx - Energy utilized at the time of data reception Ea - Energy required to keep the node active [14] 3.3 SPY AGENT ALGORITHM Step 1: Initially the Spy Agent (SA) moves around the network. Step 2: SA updates its SA Field table [i.e., the CH-ID, Life Time (LT) Value and Residual Energy (RE)] Step 3: Check, if the Residual Energy (RE) < Threshold (T) Step 4: If yes, the CH will mark as weak CH and losses its votes Step 5: Otherwise the SA moves to the next CH and repeat step (2) to (4) The following flow chart shows about the SPY Agent Process. The Proposed architecture and the SPY Agent algorithm are explained through the above flow chart. The security for the data transmission is achieved through efficient encryption and decryption mechanism which is explained in [14]. Start SPY Agent (SA) Update the SA Fields Calculate Residual Energy (RE) of Each Cluster Head If RE <T Moves to Next CH Fig.2. SPY Agent Process Flow Chart 4. SIMULATION RESULTS The CH becomes Weak CH Simulation Model and Parameters The Network Simulator (NS2) [15], is used to simulate the proposed architecture. In the simulation, the mobile nodes move in a 5 meter 5 meter region for 5 seconds of simulation time. All nodes have the same transmission range of 25 meters. The simulated traffic is Constant Bit Rate (CBR). The simulation settings and parameters are summarized in table. Table.2. Simulation Settings and Parameters No. of Nodes 2,4,6,8 and1 Area Size 5 5 Mac IEEE 82.11 Transmission Range 25m Simulation Time 5 sec Traffic Source CBR Packet Size 512 Rate 5,1,15,2 and 25kb Initial Energy 1.1J Transmission Power.66 Receiving Power.395 Routing Protocols and Performance Metrics The proposed SPY Agent based secure data aggregation is analyzed for proactive and reactive protocols. Here we have 121

T LATHIES BHASKER AND G ARUL JAGAN: SPY AGENT BASED SECURE DATA AGGREGATION IN WSN taken and protocols. The performance is evaluated mainly, according to the following metrics. Packet Delivery Ratio: It is the ratio between the number of packets received and the number of packets sent. Packet Drop: It refers the average number of packets dropped during the transmission Residual Energy: It is the energy level remain in each node after the flow transmission Delay: It is the amount of time taken by the nodes to transmit the data packets. 4.1 RESULTS 4.1.1 Based on Nodes: In the initial experiment our proposed architecture is evaluated based on number nodes as one of the parameters and the results are shown below. We vary the number of nodes as 2, 4, 6, 8 and 1. 25 2 15 1 8 7 6 5 4 3 2 1 1 8 6 4 2 2 4 6 8 1 Fig.5. Nodes Vs Drop 5 2 4 6 8 1 2 4 6 8 1 Fig.6. Nodes Vs Residual Energy Fig.3. Nodes Vs Delay 6.3.25 5 4.2 3.15 2.1 1.5 2 4 6 8 1 2 4 6 8 1 Fig.7. Nodes Vs Throughput Fig.4. Nodes Vs Delivery Ratio From the above results we can analyze the efficiency of our proposed methodology for the proactive routing protocol and reactive protocols for different number of nodes scenario. 4.1.2 Based on Rate: In our second experiment we vary the transmission rate as 5, 1, 15, 2 and 25Kb. 122

ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 14 12 12 1 1 8 6 4 8 6 4 2 2 5 1 15 2 25 5 1 15 2 25 Fig.8. Rate Vs Delay Fig.11. Rate Vs Residual Energy 1.2 1.8.6 16 14 12 1 8.4 6.2 4 2 5 1 15 2 25 5 1 15 2 25 Fig.9. Rate Vs Delivery Ratio Fig.12. Rate Vs Throughput 4 35 3 25 2 15 1 5 5 1 15 2 25 Fig.1. Rate Vs Drop From the above results we can analyze the efficiency of our proposed methodology for the proactive routing protocol and reactive protocols for different rate scenario. 5. CONCLUSION In this paper we have proposed SPY Agent based data aggregation in Wireless sensor network. In here the SPY agent moves around the network and checks the status of each cluster head whether the cluster head is available to transmit the data to the Sink or the cluster head is in weak state based on their status it will updates its table. We have analyzed the proposed architecture for two different routing protocols. In future we have the plan to improve our SPY agent based secure data aggregation scheme by using some standard encryption and decryption methods. REFERENCES [1] G. Vijayalakshmi, S. Hema and S. Geethapriya, Secure Data Aggregation & Query Processing in Wireless Sensor Networks using Enhanced Leach Protocol, International Journal of Emerging Science and Engineering, Vol. 2, No. 1, pp. 51-56, 213. 123

T LATHIES BHASKER AND G ARUL JAGAN: SPY AGENT BASED SECURE DATA AGGREGATION IN WSN [2] M. Umashankar and C. Chandrasekar, Energy Efficient Secured Data Fusion Assurance Mechanism for Wireless Sensor Networks, European Journal of Scientific Research, Vol. 49, No. 3, pp. 333-339, 211. [3] Kumar Padmanabh and Sunil Kumar Vuppala, An Adaptive Data Aggregation Algorithm in Wireless Sensor Network with Bursty Source, Wireless Sensor Network, Vol. 1, No. 3, pp. 222-232, 29. [4] V. Bhoopathy and R. M. S. Parvathi, Energy Efficient Secure Data Aggregation Protocol for Wireless Sensor Networks, European Journal of Scientific Research, Vol. 5, No. 1, pp. 48-58, 211. [5] Vaibhav Pandey, Amarjeet Kaur and Narottam Chand, A review on data aggregation techniques in wireless sensor network, Journal of Electronic and Electrical Engineering, Vol. 1, No. 2, pp. 1-8, 21. [6] Nandini. S. Patil and P. R. Patil, Data Aggregation in Wireless Sensor Network, IEEE International Conference on Computational Intelligence and Computing Research, 21. [7] Kiran Maraiya, Kamal Kant and Nitin Gupta, Wireless Sensor Network: A Review on Data Aggregation, International Journal of Scientific & Engineering Research, Vol. 2, No. 4, pp. 1-6, 211. [8] Sung-Hwa Hong, Jeong-Min Park and Joon-Min Gil, Performance Evaluation of a Simple Cluster-Based Aggregation and Routing in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, Vol. 213, Article ID: 51594, pp. 1-9, 213. [9] Y. R. Preethi, C. R. Manjunath and M. Manohar, Data Routing in In-network Aggregation in WSN: a Cluster Based approach, International Journal of Modern Engineering Research, Vol. 3, No. 3, pp. 1636-164, 213. [1] Hiren Thakkar, Sushruta Mishra and Alok Chakrabarty, A Power Efficient Cluster-based Data Aggregation Protocol for WSN (MHML), International Journal of Engineering and Innovative Technology, Vol. 1, No. 4, pp. 241-246, 212. [11] Mohammad Mostafizur Rahman Mozumdar, Nan Guofang, Francesco Gregoretti and Luciano Lavagno, An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network, Journal of Networks, Vol. 4, No. 7, pp. 598-66, 29. [12] K. Amrutha mohanan and P. Vijayalakshmi, Trust based Data Aggregation in Wireless Sensor Networks, International Journal of Computer Applications, Vol. 73, No. 22, pp. 8-12, 213. [13] Soubhagya Ranjan Behera and Asit Sar, Optimal Residual Energy Clustered Data Aggregation protocol (ORECDA) in WSNs, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 1. pp. 8-85, 213. [14] Lathies Bhasker, Genetically derived secure cluster-based data aggregation in wireless sensor networks, IET Information Security, Vol. 8, No. 1, pp. 1-7, 214. [15] Network Simulator, Available at: http:///www.isi.edu/nsnam/ns. 124