AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Similar documents
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Some Security Trends over Wireless Sensor Networks

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

A Security Architecture for. Wireless Sensor Networks Environmental

Securing MANET Using Diffie Hellman Digital Signature Scheme

DAG based In-Network Aggregation for Sensor Network Monitoring

Secure Data Aggregation in Wireless Sensor Networks

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Efficient File Sharing Scheme in Mobile Adhoc Network

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

DETECTING MALICIOUS PACKET DROPPING AND SECURE TRACE OUT IN WIRELESS AD-HOC NETWORK

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Distributive Reprogramming of Wireless Sensor Nodes with Secure Data Transmission

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

International Journal of Advanced Research in Computer Science and Software Engineering

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Efficient Data Transmission For Wireless Sensor Networks

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

A Catechistic Method for Traffic Pattern Discovery in MANET

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

How To Secure Data Aggregation In A Wireless Sensor Network

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks

Secure Routing in Wireless Sensor Networks

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Improving data integrity on cloud storage services

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL


Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Balance Network Load In A Wireless Sensor Network

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Cloud Data Storage Services Considering Public Audit for Security

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

ISSN Vol.04,Issue.19, June-2015, Pages:

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

Neighborhood-Based Security Protocol for Wireless Sensor Networks

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Wireless Sensor Network: Challenges, Issues and Research

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Transcription:

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological and Research Institute, Parvathapur, Uppal, Hyderabad, A.P, India 2 Associate Professor, Dept of CSE, Aurora's Technological and Research Institute, Parvathapur, Uppal, Hyderabad, A.P, India ABSTRACT: In large amount of sensor network, especially in case of data aggregation it should reduces the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. But these aggregation frameworks aggregation frameworks does not solve the problems which are appearing at base station side. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub aggregate values. Thorough theoretical analysis and extensive simulation study show that our algorithm outperforms other existing approaches. These problems may occur due to the irrespective of the network size, the per node communication overhead. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub aggregate values. In this paper, we develop mechanisms that generate dynamic dispersive routing algorithm. Under our design the routes taken by the shares of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the routes generated by our mechanisms are also highly dispersive and energy-efficient, making them quite capable of bypassing black holes at low energy cost. Extensive simulations are 1764 P a g e

conducted to verify the validity of our mechanisms. Keywords: Aggregation of the data, Base station, Aggregation hierarchy, Aggregation in network, Security of the network sensor, Computational complexity respectively. 1. INTRODUCTION: BLOCK DIAGRAM There is a lot of advancement takes place in the system with respect to the strategy of the transmission of the data in the wireless environment in a well efficient fashion respectively [1]. Here the networks related to the sensor oriented with the wireless phenomena in which there is a number of the applications included in it and some of them are monitoring wild habitat, detection of the forest fire followed by the surveillance of the military is a major concern respectively. As per the deployment oriented scenario by which organization of the nodes with respect to the sensor oriented with the sensor of the multi hop strategy is a well efficient related to the control of the central point base station is a major concern respectively [3][4]. Fig 1: Shows the architectural representation of the present method respectively 2. METHODOLOGY: In this paper a method is designed based on the well effective frame work oriented strategy in a well efficient manner respectively[2][5]. Here the implementation of the present technique followed by the analysis oriented aspect related to the architecture based strategy is shown in the below figure in terms of the block diagram based approach respectively. Here the 1765 P a g e

present method completely overcome the drawbacks of the several previous methods in a well efficient manner respectively [6][7][9]. Here the present implemented technique is designed in such a way in which there should be an accurate analysis is made on the lot of the previous methods oriented failures followed by the accurate analysis based aspect in a well efficient manner and improve the performance of the system followed by the improvement in the accurate outcome oriented strategy in a well effective manner respectively [8][10]. Therefore the present designed method is effective and efficient in terms of the performance based strategy followed by the outcome oriented pattern respectively. 3. EXPECTED RESULTS A lot of analysis has been made between the present method to that of the several previous methods in a well efficient manner respectively. A comparative analysis is made between the present method to that of the several previous methods and is shown in the below figure in the form of the graphical representation respectively. There is a huge challenge for the present method where it is supposed to implement the technique in a well efficient manner where it is supposed to improve the performance of the present system respectively. There are a number of experiments have been conducted on the large number of the data sets in a well effective manner respectively. There is a huge challenge for the present method where it is supposed to control the degraded performance of the previous methods in a well efficient manner followed by the accurate outcome of the system based aspect towards the accuracy related analysis of the entire system respectively. Fig 2: Shows the graphical representation of the present method respectively 4. Algorithm: Step1: when a sensor node wants to send a packet to the sink, it first breaks the packet into M shares, according to a (T,M) Ex: packet length - 20kb T-2 Then (2kb,10) (T, M) 1766 P a g e

Step2: In this network available paths are 3 1.S-a-d-D 2.S-a-b-D 3.S-c-d-D Step 3: In each share, there is a TTL field, whose initial value is set by the source node to control the total number of random paths. TTL value=m=10 Step 4: After receiving the one share to list, the TTL field is reduced by 1. TTL=TTl-1 Step 5: When the TTL value reaches 0, Once the Destination collects at least M shares, it can reconstruct the original packet. 5. CONCLUSION In this paper a method is designed with a well efficient framework oriented strategy where there is an efficient improvement in the performance followed by the outcome in a well respective fashion in the entire system respectively. Here a new strategy is designed with a well effective framework in which related to the aggregate of the network based strategy in which issues of the security aspect by which aggregation of the computational phenomena includes the sum and count respectively. Here a huge research takes place in the system by which it is related to the phenomena of the corruption of the node compromization plays a major role in its implementation aspect followed by the aggregate base station estimation respectively. Here in which the algorithms are related to the phenomena of the hierarchical approach oriented ring based scenario is a major concern respectively. Here in order to overcome the above problem an algorithm is designed by the verification of the light weight strategy in which base station enabling takes place in the system followed by the followed by the effective verification of the valid aggregate computations respectively. In this paper, we develop mechanisms that generate Dynamic Dispersive Routing Algorithm.s Here we finally conclude that the present method is 1767 P a g e

effective in terms of the performance followed by the outcome in a well oriented fashion respectively. REFERENCES [1] P. Flajolet and G. N. Martin, Probabilistic counting algorithms for data base applications, J. Computer Syst. Sci., vol. 31, no. 2, pp. 182 209, 1985. [2] D. Wagner, Resilient aggregation in sensor networks, in Proc. ACM Workshop Security of Sensor and Adhoc Networks (SASN), 2004. [3] L. Buttyan, P. Schaffer, and I. Vajda, Resilient aggregation with attack detection in sensor networks, in Proc. 2nd IEEE Workshop Sensor Networks and Systems for Pervasive Computing, 2006. [4] B. Przydatek, D. Song, and A. Perrig, SIA: Secure information aggregation in sensor networks, in Proc. 1st Int. Conf. Embedded Networked Sensor Systems (SenSys), 2003. [5] H. Chan, A. Perrig, and D. Song, Secure hierarchical in-network aggregation in sensor networks, in Proc. ACM Conf. Computer and Communications Security (CCS), 2006. [6] K. B. Frikken and J. A. Dougherty, An efficient integrity-preserving scheme for hierarchical sensor aggregation, in Proc. 1st ACM Conf. Wireless Network Security (WiSec), 2008. [7] Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAP: A secure hop-by-hop data aggregation protocol for sensor networks, in Proc. Seventh ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), 2006. [8] S. Nath, H. Yu, and H. Chan, Secure outsourced aggregation via one-way chains, in Proc. 35th SIGMOD Int. Conf. Management of Data, 2009. [9] L. Hu and D. Evans, Secure aggregation for wireless networks, in Proc. Workshop Security and Assurance in Ad hoc Networks, 2003. [10] H. Yu, Secure and highly-available aggregation queries in large-scale sensor networks via set sampling, in Proc. Int. Conf. Information Processing in Sensor Networks, 2009. 1768 P a g e