alexa Cryptography Based Data Aggregation Scheme for Data In
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Cryptography Based Data Aggregation Scheme for Data Integrity Analysis in Wireless Sensor Networks

R. Kaleeswari1 and M.N.Karuppusamy2
  1. PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
  2. Research scholar, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
Related article at Pubmed, Scholar Google
 

Abstract

Several data aggregation schemes based on homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security since cluster heads (aggregator) can directly aggregate the cipher texts without decryption. However, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the base station cannot retrieve the maximum value of all sensing data. Second, the base station cannot confirm data integrity and authenticity to each sensing sample. However, these schemes are not satisfy multi-application environments. These schemes become insecure in case some sensor nodes are compromised. To overcome these problem in our design, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable”. The proposed scheme has three contributions. First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. The design has been adopted on both homogeneous and heterogeneous wireless sensor networks.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords