Advertisement

Improving Data Accuracy in Data Aggregation with Concealing Salvation in Hierarchical Wireless Sensor Network

  • Beema NaushadEmail author
  • U. Barakkath Nisha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

Now a days, the WSNs have achieved centre of attraction because they are able to improve the grade of lifespan. WSN is used in military application, medical field, area monitoring, environmental earth sensing, forest fire detection, land slide detection, water quality monitoring etc. A wireless sensor network (WSN) is organized by a bunch of sensor nodes. These sensor nodes are spread out in a thick area. These nodes continuously collecting data from the physical atmosphere and it send to the sink node. WSNs have some limitations; sensor nodes life time is very small, the ability to perform data conversion is small and the distance of exchanging information is limited. Here, we introduce a concealing-salvation data aggregation (IDDCS) system protects data credibility, data assurance and concealing of data. It also prevent attacks from intruders. Here we are using RSA algorithm for data encryption and decryption. Encryption is doing at cluster head. The performance analysis is depend upon simulation result and the descriminate study of throughput, instant energy and drop with secure and non secure data is performed with proposed methodology.

Keywords

Wireless sensor network Concealing-salvation data accumulation 

References

  1. 1.
    Karjee, J., Jamadagni, H.S.: Data accuracy estimation for cluster with spatially correlated data in wireless sensor networks. In: International Conference on Communication Systems and Network Technologies (2012)Google Scholar
  2. 2.
    Tariq, U., Lhee, K., Hong, M.-P.: A quadtree based data accuracy scheme for wireless sensor networks. In: International Conference on Convergence Information Technolog (2007)Google Scholar
  3. 3.
    Ren, J., Wu, G., Yao, L.: A sensitive data aggregation scheme for body sensor networks based on data hiding. Pers. Ubiquitous Comput. 17(7), 1317–1329 (2013)CrossRefGoogle Scholar
  4. 4.
    Peter, S., Westhoff, D., Castelluccia, C.: A survey on the encryption of convergecast traffic with in-network processing. IEEE Trans. Dependable Secure Comput. 7(1), 20–34 (2010)CrossRefGoogle Scholar
  5. 5.
    Zhang, K., Liang, X., Baura, M., Lu, R., Shen, X.: PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf. Sci. (NY) 284, 130–141 (2014)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1632 (2012)CrossRefGoogle Scholar
  7. 7.
    Lin, X., Lu, R., Shen, X.: MDPA: multidimensional privacypreserving aggregation scheme for wireless sensor networks. Commun. Mob. Comput. 10, 843–856 (2010)Google Scholar
  8. 8.
    Alhammadi, A., Fazirulhiysam, Fadlee, M.: Effects of different types of RSS data on the system accuracy of indoor localization system. In: 6 IEEE Region 10 Symposium (TENSYMP), Bali, Indonesia (2016)Google Scholar
  9. 9.
    Chen, L., Lu, R., Cao, Z., AlHarbi, K., Lin, X.: MuDA: multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 8(5), 777–792 (2015)CrossRefGoogle Scholar
  10. 10.
    Chen, L., Lu, R., Cao, Z., AlHarbi, K., Lin, X.: MuDA: multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 8(5), 777–792 (2015)CrossRefGoogle Scholar
  11. 11.
    Ren, J., Wu, G., Yao, L.: A sensitive data aggregation scheme for body sensor networks based on data hiding. Pers. Ubiquit. Comput. 17(7), 1317–1329 (2013)CrossRefGoogle Scholar
  12. 12.
    Othman, S.B., Trad, A., Youssef, H., Alzaid, H.: Secure data aggregation with MAC authentication in wireless sensor networks. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 188–195 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringICETMuvattupuzhaIndia

Personalised recommendations