Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2260
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | K, Geethalakshmi | - |
dc.contributor.author | R, Divya | - |
dc.date.accessioned | 2020-10-22T09:19:07Z | - |
dc.date.available | 2020-10-22T09:19:07Z | - |
dc.date.issued | 2014-11 | - |
dc.identifier.issn | 2231-0711 | - |
dc.identifier.uri | http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.655.5800&rep=rep1&type=pdf | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/2260 | - |
dc.description.abstract | A wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In the wireless sensor networks, data aggregation scheme is used to reduce the large amount of transmissions. In the wireless sensor network, security is an important concern. So, in order to overcome this problem a new concealed data aggregation scheme is used. It has three contributions: First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. In this method, the aggregator is selected based on the transmission range. But the drawback is less security and less efficient. So, in this paper, an innovative technique called Trust Computation Model for Secure Data Aggregation (TCMSDA) in wireless sensor networks is introduced. A new trust management scheme is essential to differentiate illegal and normal nodes and filter out the malicious nodes in the network. In the trust computation model, each node identifies trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks incipiently beyond standard authentication mechanisms and conventional key management schemes. Experimental results show that when compared to the existing system, the proposed system achieves more efficiency and high security. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Computer Science Engineering and Technology( IJCSET) | en_US |
dc.subject | Wireless Sensor Network | en_US |
dc.subject | Data Aggregation | en_US |
dc.subject | Trust Value | en_US |
dc.title | TRUST COMPUTATION MODEL FOR SECURE DATA AGGREGATION (TCMSDA) IN WIRELESS SENSOR NETWORKS | en_US |
dc.type | Article | en_US |
Appears in Collections: | International Journals |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TRUST COMPUTATION MODEL FOR SECURE DATA AGGREGATION (TCMSDA) IN WIRELESS SENSOR NETWORKS.docx | 10.68 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.