SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645
www.ijmer.com 2460 | Page
Shaik Nagul Shareef1
, Syed Sadat Ali2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
2
Assoc. Professor & Head, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Abstract: A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices
that use sensor nodes to monitor physical or environmental conditions. These distributed autonomous devices, or nodes,
combine with routers and a gateway to create a typical WSN system. The distributed sensor nodes communicate wirelessly to
a central gateway, which provides a connection to the wired world where you can collect, process, analyze, and present your
measurement data. Due to the broadcast nature of the transmission media they use, sensor networks are vulnerable to
various security attacks, such as eavesdropping, jamming and node capture attacks. In this paper, we provide a solution for
node capture attack. Node capture attacks result from the combination of active, passive and physical attacks by an
intelligent adversary. In order to initialize or set up a node capture attack, the adversary will collect information about the
WSN by eavesdropping on message exchanges, either local to a single adversarial device or throughout the network with the
aid of a number of adversarial devices deployed throughout the network. Hence in order to securely aggregate data in a
wireless sensor network, we must not only provide protection against eavesdroppers, but we should also prevent
intermediate sensors from having access to the data.
Keywords: Aggregation, Sensor node, Slicing, WSN.
I. INTRODUCTION
Wireless sensor networks (WSN) (Figure 1) are self organizing networks of small, battery powered sensors used to
monitor the environment for events such as enemy troop movements in military, forest fires, pollutant levels. A large number
of small, battery powered computing devices with built-in radio equipment are spread over the area to be monitored. Upon
activation, these sensor nodes self-organize into a multi-hop network, which connects to the users via a powerful base station
in order to achieve a common goal [1]. As each sensor surveys the area within its sensing range, the information is sent
towards the base station along a multi- hop path. A sensor network is able to remotely cover a large sensing area since these
low cost sensors organize into a multi-hop network without human assistance. Since sensor nodes are typically battery
powered and a WSN contains thousands of sensors, replacing the batteries is not a possibility. In terms of energy usage,
communication is much more expensive than any internal computations [2]. In data aggregation, intermediate results are
calculated along the multi-hop path whenever two or more messages are routed along the same path. Depending on the
routing structure, power savings may be by as much as eight times [3].
Security in sensor networks includes confidentiality, integrity and availability. Confidentiality in WSNs is
accomplished by preventing outsiders from eavesdropping on transmissions. This is generally achieved by enciphering the
relevant parts of a packet. Integrity in general means that the receiver is assured that the network packet was not tampered
with or the message altered in some way. By ensuring the availability we mean that the data is available in a timely fashion
so that it is useful to the user. Availability in WSNs is of great concern to the user of the network. Unfortunately, many
existing security primitives can not be used in WSNs, either because the computing power of the sensors is too limited or the
additional work created by the protocols causes excessive network traffic [4].
Figure 1 : Wireless sensor network example
Sensors in WSNs can become corrupted due to the environment such as water, wind or sand acting on the sensor. In
hostile environments, a sensor may deliberately be corrupted by an attacker. A corrupted sensor may appear to participate in
the mission of the network but falsify make sensor readings, improperly apply an aggregation function, exclude legitimate
messages from the aggregate result or create a fictitious result. A sensor corrupted by an hacker may behave in this way in
order to get the base station to accept an incorrect result that is favorable to the attacker. Hence in order to securely aggregate
data in a sensor network, we must not only provide protection against eavesdroppers, but we should also prevent the
intermediate sensors from having access to the data.
Secure and Efficient Hierarchical Data Aggregation in
Wireless Sensor Networks
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645
www.ijmer.com 2461 | Page
II. DATA AGGREGATION IN WSNS
In a typical WSN, a large number of sensor nodes collect application specific information from the environment and
this information is transferred to a central base station where it is processed, analyzed, and used by the application. In these
resource constrained networks, the general approach is to jointly process the data generated by different sensors while being
forwarded toward the base station [5]. Such distributed in-network processing of data is generally called as data aggregation
and involves combining the data that belong the same phenomenon. The main objective of hierarchical data aggregation is to
increase the network lifetime by reducing the resource consumption of sensor nodes (such as battery energy and bandwidth).
While increasing network lifetime, data aggregation protocols may degrade the important quality of service metrics in
wireless sensor networks, such as data accuracy, latency, fault-tolerance, and security. Therefore, the design of an efficient
data aggregation protocol is an inherently challenging task because the protocol designer must trade off between energy
efficiency, data accuracy, fault-tolerance, latency, and security.
In order to achieve this trade off, data aggregation techniques are tightly coupled with how packets are routed
through the sensor network. Hence, the architecture of the WSN plays a vital role in the performance of different data
aggregation protocols. There are several protocols that allow routing and aggregation of network packets simultaneously.
These protocols can be categorized into two parts: cluster-based data aggregation protocols and tree based data aggregation
protocols. To reduce the latency due to tree based data aggregation, recent work on data aggregation process tends to group
sensor nodes into clusters so that data are aggregated in each group for improved efficiency.
III. NODE CAPTURE ATTACK
WSNs are vulnerable to node capture attacks[6] because sensor nodes are usually deployed in unattended manner.
Once attacker captures the sensor nodes, he can compromise them and launch various types of attacks with those
compromised nodes. A straightforward strategy for sensor node compromise is to launch a node capture attack in which
adversary physically captures all sensor nodes, removes them from the network, compromises and redeploys them in the
network. After redeploying compromised nodes, he can mount a variety of attacks with the compromised nodes. For
example, he can simply monitor a significant fraction of the network traffic that would pass through these vulnerable nodes.
Alternatively, he could jam legitimate signals from benign nodes or inject falsified data to corrupt monitoring operation of
the sensor nodes. A more aggressive attacker could undermine common sensor network protocols, including routing, cluster
formation and data aggregation, thereby causing continual disruption to the network operations. Hence, node capture attacks
are very dangerous and thus should be detected as quickly as possible to minimize the damage incurred by them.
IV. EXISTING SYSTEM
In Existing System, the aggregate data to be transmitted through sensor nodes, a security threat is originate by any
node. So, that time attacker achieves full control over a sensor node through direct physical path in wireless sensor network.
It makes to data loss and risk of data privacy. A typical sensor network consists of a large number of sensor nodes randomly
deployed over a wide area. Sensor nodes are typically low cost hardware components with severe limitations on energy,
memory and communication resources. The disadvantages of the existing system are:
1. Sensor nodes are exposed to maximum failures.
2. Sensor nodes which make use of the broadcast communication pattern and have severe bandwidth restraint.
3. Sensor nodes have inadequate amount of resources.
V. PROPOSED SYSTEM
In Proposed System, to avoid data loss initially sensor network is separated into different clusters each cluster is
headed by an aggregator and directed connected to sink. So, this idea basically dispersed data processing measures to save
the power and minimize the medium access layer contention in wireless sensor networks. It proposed the distinct Structure
and Density Independent Group Based Key Management Protocol (DGKE) [7]. The protocol offers:
 A better secure communication,
 Secure data aggregation,
 Confidentiality and
 Resilience against node capture and
 Replication attacks using reduced resources.
A. Wireless Sensor Network
WSNs consist of numerous low cost, little devices and are in nature self organizing ad hoc systems. The job of the
WSN is to monitor the physical environment, gather and transmit the information to other sink nodes. Generally, radio
transmission ranges for the WSNs are in the orders of the magnitude that is lesser that of the geographical scope of the
unbroken network. Hence, the transmission of the data is done from hop-by-hop to the sink in a multi-hop manner. Reducing
the amount of the data to be relayed thereby reduces the consumption of energy in the network.
B. Hierarchical Secure Data Aggregation
Combine the data from various sources, redirect it with the removal of the redundancy and thereby reducing the
number of transmissions and also saves energy. The inbuilt redundancy in the raw data gathered from various sensor nodes
can be banned by the in-network data aggregation. Two securities in the data aggregation of sensor network is data
Confidentiality: In particular, the fundamental security issue is the data privacy that protects the transmitted data which is
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645
www.ijmer.com 2462 | Page
sensitive from the passive attacks like eavesdropping. The significance of the data confidentiality is in the hostile
environment, where the wireless channel is more prone to eavesdropping attack. Though cryptography provides plenty of
methods, such as the process related to complicated enciphering and deciphering, like modular multiplication of large
numbers in public key based on cryptosystems, utilizes the sensor’s power speedily. Data Integrity: It avoids the
modification of the last aggregation value by the negotiating source nodes (aggregator nodes). Sensors can be without
difficulty compromised because of the lack of the expensive tampering-resistant hardware. The otherwise hardware that has
been used may not be reliable at all times. A compromised message is able to modify, forge and discard all messages.
C. Countering Node Capture Attacks
The process of getting hold of the sensors through a physical attack is termed as node capture attack. For example:
uncovering the sensor node and adding wires in any place. This attack essentially differs from getting hold of a sensor via
certain software bug. Since sensor nodes are typically supposed to operate the same software, specifically, the operating
software which discovers the suitable bug permits the adversary to manage the entire sensor network. Distinctly, the node
capture attacks can be set over the small segment of adequately large network. There are two types of node captures possible:
Random node capture and Selective node capture. The following algorithm is used to detect node capture attacks.
Algorithm Node_Capture_Attack (node, aggregator, key, cluster, AGGadv)
{
// ui is a member node in cluster Cj where j = 1to n.
// Aj is the aggregator of the cluster Cj.
// AGGadv represents Aggregator Advertisement Message
// R1 is the first round of aggregation.
// TS1 is R1’s respective time stamp.
// Aj possess a secret key (kjsec) which is shared with the sink.
// In R1, the aggregator broadcasts the AGGadv to all the nodes.
// ui sends acknowledgment (ACK) message to Aj.
// ACK = {wi, g} Where wi = node’s ID, g = node’s category. // based on ACK messages, the Aj selects c nodes (c<n)
randomly.
Set Q = {u1, u2, …..uc}. // selected c nodes are represented by the set Q
V = [(w1, Kw1), (w2, Kw2), ………, (wc, Kwc)]
// the Aj broadcasts a set of unique values V to all nodes in Q. //V consists of the node ids of Q and their authentication key.
// Kwi denotes the authentication keys of the corresponding node wi.
X=1+2+…+C.
//X represents data which sliced into c pieces.
//assume u2 wants to send the data to any node .First u2 send encrypted data to nearest node u3.
//In c slices, one of them is kept inside that node itself.
//u3 waits for a time t, which assures that all slices of this round of aggregation are received. 1+2+…. +(c-1) =Sc
// sums up the received slices
//Sc is again encrypted with the authentication key of the respective node and sent to the Aj
// Aj aggregates and encrypts the data with the shared key kjsec and forwards it to towards sink.
//The message in the form MAC (ED, TS1) where TS1 = time stamp, ED = encrypted data.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645
www.ijmer.com 2463 | Page
If (TS1 expires)
{
R1 ends R2 starts TS2begins
}
//The same procedure is repeated for R2 except that the set of nodes in Q is reselected with new
//set of authentication keys.
}
D. Slicing Technique
The Slicing technique is described using the slicing architecture shown in Figure 2. Consider the node 2 in below
figure. When it wants to send data to its neighboring nodes, it slices the data “X” into 8 pieces (since network size u=8). It
holds the one of the slices with it. The remaining slices are encrypted with their respective authentication keys and sent to
rest of the sensor nodes.
Figure 2: Slicing Technique
When the node 1 receives the encrypted data slice from node 2, then it decrypts the slice using its authentication key
K1. Then Node 1 waits for reception of the rest of the slices until time “t”. When “t” expires, the node 1 stops receiving the
data slice. After complete decryption of the received slices, the node 1 sums them up along with the slice within it and this
sum is represented as “S1”.
S1 = C11 + C21+C41+ C81
The node 1 encrypts “S1” with k1 and sent to the aggregator A1. The aggregator encrypts the data with a secret
shared key (kjsec) and forwards it to the sink.
VI. CONCLUSION
WSNs are increasingly becoming the networks of choice in various industrial, medical and military applications,
including remote plant control, health monitoring and target surveillance. Wireless sensor network consists of a huge
number of tiny electromechanical sensor nodes that are capable of sensing, computing and communicating. Serious security
threat is originated by node capture attacks in hierarchical data aggregation where a attacker achieves full control over a
sensor node through direct physical access in wireless sensor networks. It makes a high risk of data privacy. In this propose,
we propose a method for countering node capture attacks for hierarchical data aggregation in wireless sensor networks.
REFERENCES
[1] L. Clare, G. Pottie, and J. R. Agre, “Self-organizing distributed sensor networks,” SPIE-The International Society for Optical
Engineering, pp. 229–237, 1999.
[2] R. W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,”
in MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM
Press, 1999, pp. 174–185.
[3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energyefficient communication protocol for wireless microsensor
networks,” in HICSS ’00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8. Washington,
DC, USA: IEEE Computer Society, 2000, p. 8020.
[4] J. Albath and S. Madria, “Practical algorithm for data security (pads) in wireless sensor networks,” in MobiDE ’07: Proceedings of
the 6th ACM international workshop on Data engineering for wireless and mobile access. New York, NY, USA: ACM Press, 2007,
pp. 9–16.
[5] R. Rajagopalan, P.K. Varshney, Data aggregation techniques in sensor networks: a survey, IEEE Commun. Surveys Tutorials 8 (4)
(2006).
[6] Conti, M., Pietro, R., Mancini, L., & Mei, A. (2008). Emergent Properties: Detection of the Node-capture Attack in Mobile
Wireless Sensor Networks. In ACM WiSec, April 2008.
[7] K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones, ―Group Based Secure Communication for Large-Scale Wireless Sensor
Networks‖ , journal of information assurance and security, Vol 2, Issue 2, June 2007 .

Weitere ähnliche Inhalte

Was ist angesagt?

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor networkShiwangi Thakur
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...cscpconf
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...csandit
 
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An AssessmentSensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An Assessmentijtsrd
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 

Was ist angesagt? (19)

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Presentation1
Presentation1Presentation1
Presentation1
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
A0320105
A0320105A0320105
A0320105
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
C0511318
C0511318C0511318
C0511318
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
 
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An AssessmentSensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An Assessment
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 

Andere mochten auch

An Application of Energy and Exergy Analysis of Transport Sector of India
An Application of Energy and Exergy Analysis of Transport  Sector of IndiaAn Application of Energy and Exergy Analysis of Transport  Sector of India
An Application of Energy and Exergy Analysis of Transport Sector of IndiaIJMER
 
Flashcard baocaolan1
Flashcard baocaolan1Flashcard baocaolan1
Flashcard baocaolan1lienptk
 
On The Zeros of Polynomials
On The Zeros of PolynomialsOn The Zeros of Polynomials
On The Zeros of PolynomialsIJMER
 
Cost Analysis of Small Scale Solar and Wind Energy Systems
Cost Analysis of Small Scale Solar and Wind Energy SystemsCost Analysis of Small Scale Solar and Wind Energy Systems
Cost Analysis of Small Scale Solar and Wind Energy SystemsIJMER
 
Experimental and Analytical Study on Reinforced Concrete Deep Bea
Experimental and Analytical Study on Reinforced Concrete Deep BeaExperimental and Analytical Study on Reinforced Concrete Deep Bea
Experimental and Analytical Study on Reinforced Concrete Deep BeaIJMER
 
Gecko Stick
Gecko StickGecko Stick
Gecko StickIJMER
 
Bp32849856
Bp32849856Bp32849856
Bp32849856IJMER
 
The beginig
The beginigThe beginig
The beginigtaha009
 
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...IJMER
 
An Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessAn Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessIJMER
 
Bg31189192
Bg31189192 Bg31189192
Bg31189192 IJMER
 
Bd31172177
Bd31172177Bd31172177
Bd31172177IJMER
 
Ijmer 46065258
Ijmer 46065258Ijmer 46065258
Ijmer 46065258IJMER
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagationIJMER
 
Significance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaSignificance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaIJMER
 
Bw31297301
Bw31297301Bw31297301
Bw31297301IJMER
 
E04012533
E04012533E04012533
E04012533IJMER
 
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...IJMER
 
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...IJMER
 
Bq31254262
Bq31254262Bq31254262
Bq31254262IJMER
 

Andere mochten auch (20)

An Application of Energy and Exergy Analysis of Transport Sector of India
An Application of Energy and Exergy Analysis of Transport  Sector of IndiaAn Application of Energy and Exergy Analysis of Transport  Sector of India
An Application of Energy and Exergy Analysis of Transport Sector of India
 
Flashcard baocaolan1
Flashcard baocaolan1Flashcard baocaolan1
Flashcard baocaolan1
 
On The Zeros of Polynomials
On The Zeros of PolynomialsOn The Zeros of Polynomials
On The Zeros of Polynomials
 
Cost Analysis of Small Scale Solar and Wind Energy Systems
Cost Analysis of Small Scale Solar and Wind Energy SystemsCost Analysis of Small Scale Solar and Wind Energy Systems
Cost Analysis of Small Scale Solar and Wind Energy Systems
 
Experimental and Analytical Study on Reinforced Concrete Deep Bea
Experimental and Analytical Study on Reinforced Concrete Deep BeaExperimental and Analytical Study on Reinforced Concrete Deep Bea
Experimental and Analytical Study on Reinforced Concrete Deep Bea
 
Gecko Stick
Gecko StickGecko Stick
Gecko Stick
 
Bp32849856
Bp32849856Bp32849856
Bp32849856
 
The beginig
The beginigThe beginig
The beginig
 
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
 
An Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessAn Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking Process
 
Bg31189192
Bg31189192 Bg31189192
Bg31189192
 
Bd31172177
Bd31172177Bd31172177
Bd31172177
 
Ijmer 46065258
Ijmer 46065258Ijmer 46065258
Ijmer 46065258
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
 
Significance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-GoaSignificance Assessment of Architectural Heritage Monuments in Old-Goa
Significance Assessment of Architectural Heritage Monuments in Old-Goa
 
Bw31297301
Bw31297301Bw31297301
Bw31297301
 
E04012533
E04012533E04012533
E04012533
 
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...
Planning and Designing a Stand Alone Solar Power System for Multi-Building Or...
 
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...
A Unique Application to Reserve Doctor Appointment by Using Wireless Applicat...
 
Bq31254262
Bq31254262Bq31254262
Bq31254262
 

Ähnlich wie Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks

A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
 

Ähnlich wie Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks (20)

A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
S04404116120
S04404116120S04404116120
S04404116120
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Chapter
ChapterChapter
Chapter
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 

Mehr von IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Mehr von IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Kürzlich hochgeladen (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645 www.ijmer.com 2460 | Page Shaik Nagul Shareef1 , Syed Sadat Ali2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 Assoc. Professor & Head, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Abstract: A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices that use sensor nodes to monitor physical or environmental conditions. These distributed autonomous devices, or nodes, combine with routers and a gateway to create a typical WSN system. The distributed sensor nodes communicate wirelessly to a central gateway, which provides a connection to the wired world where you can collect, process, analyze, and present your measurement data. Due to the broadcast nature of the transmission media they use, sensor networks are vulnerable to various security attacks, such as eavesdropping, jamming and node capture attacks. In this paper, we provide a solution for node capture attack. Node capture attacks result from the combination of active, passive and physical attacks by an intelligent adversary. In order to initialize or set up a node capture attack, the adversary will collect information about the WSN by eavesdropping on message exchanges, either local to a single adversarial device or throughout the network with the aid of a number of adversarial devices deployed throughout the network. Hence in order to securely aggregate data in a wireless sensor network, we must not only provide protection against eavesdroppers, but we should also prevent intermediate sensors from having access to the data. Keywords: Aggregation, Sensor node, Slicing, WSN. I. INTRODUCTION Wireless sensor networks (WSN) (Figure 1) are self organizing networks of small, battery powered sensors used to monitor the environment for events such as enemy troop movements in military, forest fires, pollutant levels. A large number of small, battery powered computing devices with built-in radio equipment are spread over the area to be monitored. Upon activation, these sensor nodes self-organize into a multi-hop network, which connects to the users via a powerful base station in order to achieve a common goal [1]. As each sensor surveys the area within its sensing range, the information is sent towards the base station along a multi- hop path. A sensor network is able to remotely cover a large sensing area since these low cost sensors organize into a multi-hop network without human assistance. Since sensor nodes are typically battery powered and a WSN contains thousands of sensors, replacing the batteries is not a possibility. In terms of energy usage, communication is much more expensive than any internal computations [2]. In data aggregation, intermediate results are calculated along the multi-hop path whenever two or more messages are routed along the same path. Depending on the routing structure, power savings may be by as much as eight times [3]. Security in sensor networks includes confidentiality, integrity and availability. Confidentiality in WSNs is accomplished by preventing outsiders from eavesdropping on transmissions. This is generally achieved by enciphering the relevant parts of a packet. Integrity in general means that the receiver is assured that the network packet was not tampered with or the message altered in some way. By ensuring the availability we mean that the data is available in a timely fashion so that it is useful to the user. Availability in WSNs is of great concern to the user of the network. Unfortunately, many existing security primitives can not be used in WSNs, either because the computing power of the sensors is too limited or the additional work created by the protocols causes excessive network traffic [4]. Figure 1 : Wireless sensor network example Sensors in WSNs can become corrupted due to the environment such as water, wind or sand acting on the sensor. In hostile environments, a sensor may deliberately be corrupted by an attacker. A corrupted sensor may appear to participate in the mission of the network but falsify make sensor readings, improperly apply an aggregation function, exclude legitimate messages from the aggregate result or create a fictitious result. A sensor corrupted by an hacker may behave in this way in order to get the base station to accept an incorrect result that is favorable to the attacker. Hence in order to securely aggregate data in a sensor network, we must not only provide protection against eavesdroppers, but we should also prevent the intermediate sensors from having access to the data. Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645 www.ijmer.com 2461 | Page II. DATA AGGREGATION IN WSNS In a typical WSN, a large number of sensor nodes collect application specific information from the environment and this information is transferred to a central base station where it is processed, analyzed, and used by the application. In these resource constrained networks, the general approach is to jointly process the data generated by different sensors while being forwarded toward the base station [5]. Such distributed in-network processing of data is generally called as data aggregation and involves combining the data that belong the same phenomenon. The main objective of hierarchical data aggregation is to increase the network lifetime by reducing the resource consumption of sensor nodes (such as battery energy and bandwidth). While increasing network lifetime, data aggregation protocols may degrade the important quality of service metrics in wireless sensor networks, such as data accuracy, latency, fault-tolerance, and security. Therefore, the design of an efficient data aggregation protocol is an inherently challenging task because the protocol designer must trade off between energy efficiency, data accuracy, fault-tolerance, latency, and security. In order to achieve this trade off, data aggregation techniques are tightly coupled with how packets are routed through the sensor network. Hence, the architecture of the WSN plays a vital role in the performance of different data aggregation protocols. There are several protocols that allow routing and aggregation of network packets simultaneously. These protocols can be categorized into two parts: cluster-based data aggregation protocols and tree based data aggregation protocols. To reduce the latency due to tree based data aggregation, recent work on data aggregation process tends to group sensor nodes into clusters so that data are aggregated in each group for improved efficiency. III. NODE CAPTURE ATTACK WSNs are vulnerable to node capture attacks[6] because sensor nodes are usually deployed in unattended manner. Once attacker captures the sensor nodes, he can compromise them and launch various types of attacks with those compromised nodes. A straightforward strategy for sensor node compromise is to launch a node capture attack in which adversary physically captures all sensor nodes, removes them from the network, compromises and redeploys them in the network. After redeploying compromised nodes, he can mount a variety of attacks with the compromised nodes. For example, he can simply monitor a significant fraction of the network traffic that would pass through these vulnerable nodes. Alternatively, he could jam legitimate signals from benign nodes or inject falsified data to corrupt monitoring operation of the sensor nodes. A more aggressive attacker could undermine common sensor network protocols, including routing, cluster formation and data aggregation, thereby causing continual disruption to the network operations. Hence, node capture attacks are very dangerous and thus should be detected as quickly as possible to minimize the damage incurred by them. IV. EXISTING SYSTEM In Existing System, the aggregate data to be transmitted through sensor nodes, a security threat is originate by any node. So, that time attacker achieves full control over a sensor node through direct physical path in wireless sensor network. It makes to data loss and risk of data privacy. A typical sensor network consists of a large number of sensor nodes randomly deployed over a wide area. Sensor nodes are typically low cost hardware components with severe limitations on energy, memory and communication resources. The disadvantages of the existing system are: 1. Sensor nodes are exposed to maximum failures. 2. Sensor nodes which make use of the broadcast communication pattern and have severe bandwidth restraint. 3. Sensor nodes have inadequate amount of resources. V. PROPOSED SYSTEM In Proposed System, to avoid data loss initially sensor network is separated into different clusters each cluster is headed by an aggregator and directed connected to sink. So, this idea basically dispersed data processing measures to save the power and minimize the medium access layer contention in wireless sensor networks. It proposed the distinct Structure and Density Independent Group Based Key Management Protocol (DGKE) [7]. The protocol offers:  A better secure communication,  Secure data aggregation,  Confidentiality and  Resilience against node capture and  Replication attacks using reduced resources. A. Wireless Sensor Network WSNs consist of numerous low cost, little devices and are in nature self organizing ad hoc systems. The job of the WSN is to monitor the physical environment, gather and transmit the information to other sink nodes. Generally, radio transmission ranges for the WSNs are in the orders of the magnitude that is lesser that of the geographical scope of the unbroken network. Hence, the transmission of the data is done from hop-by-hop to the sink in a multi-hop manner. Reducing the amount of the data to be relayed thereby reduces the consumption of energy in the network. B. Hierarchical Secure Data Aggregation Combine the data from various sources, redirect it with the removal of the redundancy and thereby reducing the number of transmissions and also saves energy. The inbuilt redundancy in the raw data gathered from various sensor nodes can be banned by the in-network data aggregation. Two securities in the data aggregation of sensor network is data Confidentiality: In particular, the fundamental security issue is the data privacy that protects the transmitted data which is
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645 www.ijmer.com 2462 | Page sensitive from the passive attacks like eavesdropping. The significance of the data confidentiality is in the hostile environment, where the wireless channel is more prone to eavesdropping attack. Though cryptography provides plenty of methods, such as the process related to complicated enciphering and deciphering, like modular multiplication of large numbers in public key based on cryptosystems, utilizes the sensor’s power speedily. Data Integrity: It avoids the modification of the last aggregation value by the negotiating source nodes (aggregator nodes). Sensors can be without difficulty compromised because of the lack of the expensive tampering-resistant hardware. The otherwise hardware that has been used may not be reliable at all times. A compromised message is able to modify, forge and discard all messages. C. Countering Node Capture Attacks The process of getting hold of the sensors through a physical attack is termed as node capture attack. For example: uncovering the sensor node and adding wires in any place. This attack essentially differs from getting hold of a sensor via certain software bug. Since sensor nodes are typically supposed to operate the same software, specifically, the operating software which discovers the suitable bug permits the adversary to manage the entire sensor network. Distinctly, the node capture attacks can be set over the small segment of adequately large network. There are two types of node captures possible: Random node capture and Selective node capture. The following algorithm is used to detect node capture attacks. Algorithm Node_Capture_Attack (node, aggregator, key, cluster, AGGadv) { // ui is a member node in cluster Cj where j = 1to n. // Aj is the aggregator of the cluster Cj. // AGGadv represents Aggregator Advertisement Message // R1 is the first round of aggregation. // TS1 is R1’s respective time stamp. // Aj possess a secret key (kjsec) which is shared with the sink. // In R1, the aggregator broadcasts the AGGadv to all the nodes. // ui sends acknowledgment (ACK) message to Aj. // ACK = {wi, g} Where wi = node’s ID, g = node’s category. // based on ACK messages, the Aj selects c nodes (c<n) randomly. Set Q = {u1, u2, …..uc}. // selected c nodes are represented by the set Q V = [(w1, Kw1), (w2, Kw2), ………, (wc, Kwc)] // the Aj broadcasts a set of unique values V to all nodes in Q. //V consists of the node ids of Q and their authentication key. // Kwi denotes the authentication keys of the corresponding node wi. X=1+2+…+C. //X represents data which sliced into c pieces. //assume u2 wants to send the data to any node .First u2 send encrypted data to nearest node u3. //In c slices, one of them is kept inside that node itself. //u3 waits for a time t, which assures that all slices of this round of aggregation are received. 1+2+…. +(c-1) =Sc // sums up the received slices //Sc is again encrypted with the authentication key of the respective node and sent to the Aj // Aj aggregates and encrypts the data with the shared key kjsec and forwards it to towards sink. //The message in the form MAC (ED, TS1) where TS1 = time stamp, ED = encrypted data.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2460-2463 ISSN: 2249-6645 www.ijmer.com 2463 | Page If (TS1 expires) { R1 ends R2 starts TS2begins } //The same procedure is repeated for R2 except that the set of nodes in Q is reselected with new //set of authentication keys. } D. Slicing Technique The Slicing technique is described using the slicing architecture shown in Figure 2. Consider the node 2 in below figure. When it wants to send data to its neighboring nodes, it slices the data “X” into 8 pieces (since network size u=8). It holds the one of the slices with it. The remaining slices are encrypted with their respective authentication keys and sent to rest of the sensor nodes. Figure 2: Slicing Technique When the node 1 receives the encrypted data slice from node 2, then it decrypts the slice using its authentication key K1. Then Node 1 waits for reception of the rest of the slices until time “t”. When “t” expires, the node 1 stops receiving the data slice. After complete decryption of the received slices, the node 1 sums them up along with the slice within it and this sum is represented as “S1”. S1 = C11 + C21+C41+ C81 The node 1 encrypts “S1” with k1 and sent to the aggregator A1. The aggregator encrypts the data with a secret shared key (kjsec) and forwards it to the sink. VI. CONCLUSION WSNs are increasingly becoming the networks of choice in various industrial, medical and military applications, including remote plant control, health monitoring and target surveillance. Wireless sensor network consists of a huge number of tiny electromechanical sensor nodes that are capable of sensing, computing and communicating. Serious security threat is originated by node capture attacks in hierarchical data aggregation where a attacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a high risk of data privacy. In this propose, we propose a method for countering node capture attacks for hierarchical data aggregation in wireless sensor networks. REFERENCES [1] L. Clare, G. Pottie, and J. R. Agre, “Self-organizing distributed sensor networks,” SPIE-The International Society for Optical Engineering, pp. 229–237, 1999. [2] R. W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM Press, 1999, pp. 174–185. [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energyefficient communication protocol for wireless microsensor networks,” in HICSS ’00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8. Washington, DC, USA: IEEE Computer Society, 2000, p. 8020. [4] J. Albath and S. Madria, “Practical algorithm for data security (pads) in wireless sensor networks,” in MobiDE ’07: Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access. New York, NY, USA: ACM Press, 2007, pp. 9–16. [5] R. Rajagopalan, P.K. Varshney, Data aggregation techniques in sensor networks: a survey, IEEE Commun. Surveys Tutorials 8 (4) (2006). [6] Conti, M., Pietro, R., Mancini, L., & Mei, A. (2008). Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. In ACM WiSec, April 2008. [7] K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones, ―Group Based Secure Communication for Large-Scale Wireless Sensor Networks‖ , journal of information assurance and security, Vol 2, Issue 2, June 2007 .