An enhanced security pattern for wireless sensor network

Venu Madhav Kuthadi, Rajalakshmi Selvaraj, Tshilidzi Marwala

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015
EditorsJyotsna Kumar Mandal, Vikrant Bhateja, Suresh Chandra Satapathy, K. Srujan Raju
PublisherSpringer Verlag
Pages61-71
Number of pages11
ISBN (Print)9788132225225
DOIs
Publication statusPublished - Jan 1 2016
Event2nd International Conference on Computer and Communication Technologies, IC3T 2015 - Hyderabad, India
Duration: Jul 24 2015Jul 26 2015

Publication series

NameAdvances in Intelligent Systems and Computing
Volume380
ISSN (Print)2194-5357

Other

Other2nd International Conference on Computer and Communication Technologies, IC3T 2015
CountryIndia
CityHyderabad
Period7/24/157/26/15

Fingerprint

Wireless sensor networks
Agglomeration
Base stations
Data privacy
Sensors
Security of data
Network performance
Routing protocols
Cryptography
Energy utilization
Topology
Network protocols
Communication

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Kuthadi, V. M., Selvaraj, R., & Marwala, T. (2016). An enhanced security pattern for wireless sensor network. In J. K. Mandal, V. Bhateja, S. C. Satapathy, & K. S. Raju (Eds.), Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015 (pp. 61-71). (Advances in Intelligent Systems and Computing; Vol. 380). Springer Verlag. https://doi.org/10.1007/978-81-322-2523-2_6
Kuthadi, Venu Madhav ; Selvaraj, Rajalakshmi ; Marwala, Tshilidzi. / An enhanced security pattern for wireless sensor network. Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. editor / Jyotsna Kumar Mandal ; Vikrant Bhateja ; Suresh Chandra Satapathy ; K. Srujan Raju. Springer Verlag, 2016. pp. 61-71 (Advances in Intelligent Systems and Computing).
@inproceedings{29e980cbfe744528bda8fc2c4610bb21,
title = "An enhanced security pattern for wireless sensor network",
abstract = "Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.",
author = "Kuthadi, {Venu Madhav} and Rajalakshmi Selvaraj and Tshilidzi Marwala",
year = "2016",
month = "1",
day = "1",
doi = "10.1007/978-81-322-2523-2_6",
language = "English",
isbn = "9788132225225",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "61--71",
editor = "Mandal, {Jyotsna Kumar} and Vikrant Bhateja and Satapathy, {Suresh Chandra} and Raju, {K. Srujan}",
booktitle = "Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015",
address = "Germany",

}

Kuthadi, VM, Selvaraj, R & Marwala, T 2016, An enhanced security pattern for wireless sensor network. in JK Mandal, V Bhateja, SC Satapathy & KS Raju (eds), Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. Advances in Intelligent Systems and Computing, vol. 380, Springer Verlag, pp. 61-71, 2nd International Conference on Computer and Communication Technologies, IC3T 2015, Hyderabad, India, 7/24/15. https://doi.org/10.1007/978-81-322-2523-2_6

An enhanced security pattern for wireless sensor network. / Kuthadi, Venu Madhav; Selvaraj, Rajalakshmi; Marwala, Tshilidzi.

Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. ed. / Jyotsna Kumar Mandal; Vikrant Bhateja; Suresh Chandra Satapathy; K. Srujan Raju. Springer Verlag, 2016. p. 61-71 (Advances in Intelligent Systems and Computing; Vol. 380).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - An enhanced security pattern for wireless sensor network

AU - Kuthadi, Venu Madhav

AU - Selvaraj, Rajalakshmi

AU - Marwala, Tshilidzi

PY - 2016/1/1

Y1 - 2016/1/1

N2 - Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.

AB - Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done byclustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.

UR - http://www.scopus.com/inward/record.url?scp=84945968998&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84945968998&partnerID=8YFLogxK

U2 - 10.1007/978-81-322-2523-2_6

DO - 10.1007/978-81-322-2523-2_6

M3 - Conference contribution

SN - 9788132225225

T3 - Advances in Intelligent Systems and Computing

SP - 61

EP - 71

BT - Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015

A2 - Mandal, Jyotsna Kumar

A2 - Bhateja, Vikrant

A2 - Satapathy, Suresh Chandra

A2 - Raju, K. Srujan

PB - Springer Verlag

ER -

Kuthadi VM, Selvaraj R, Marwala T. An enhanced security pattern for wireless sensor network. In Mandal JK, Bhateja V, Satapathy SC, Raju KS, editors, Proceedings of the 2nd International Conference on Computer and Communication Technologies, IC3T 2015. Springer Verlag. 2016. p. 61-71. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-81-322-2523-2_6