Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol

被引:22
|
作者
Gomathi, S. [1 ]
Krishnan, C. Gopala [1 ]
机构
[1] Francis Xavier Engn Coll, CSE Dept, Tirunelveli, Tamil Nadu, India
关键词
Wireless sensor networks (WSN); Secure data aggregation protocol (SDAP); Certificate authority (CA); Malicious node detection;
D O I
10.1007/s11277-020-07291-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks are randomly deployed and responsible for monitoring geographical area wide. In WSN, the aggregation of data is very complex because of its limited power and computing capabilities. Issue in data aggregation is that the data may be passed on malicious node. All the existing data aggregation techniques undergo security issues because of the transfer of large amount of data. In this paper we propose a protocol named Secure Data Aggregation Protocol (SDAP) which identifies the malicious node by providing a logical group in the form of tree topology. In the tree topology the aggregation is formed by aggregating the nodes, which are non-leaf node and high level of trust is required to provide a better approximation and accuracy against the security threats. Thus the data is securely aggregated and the efficiency is achieved in data aggregation.
引用
收藏
页码:1775 / 1790
页数:16
相关论文
共 50 条
  • [1] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    S. Gomathi
    C. Gopala Krishnan
    [J]. Wireless Personal Communications, 2020, 113 : 1775 - 1790
  • [2] A Multipath Secure Routing Protocol Based on Malicious Node Detection in Wireless Sensor Networks
    Yao Lan
    Gao Fuxiang
    Zhao Zhibin
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 799 - 804
  • [3] Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
    Li, Hongjuan
    Li, Keqiu
    Qu, Wenyu
    Stojmenovic, Ivan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 108 - 116
  • [4] Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks
    Li, Hongjuan
    Li, Keqiu
    Qu, Wenyu
    Stojmenovic, Ivan
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 2 - +
  • [5] Secure Aggregation with Malicious Node Revocation in Sensor Networks
    Chen, Binbin
    Yu, Haifeng
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 581 - 592
  • [6] Secure and Efficient Data Aggregation for Wireless Sensor Networks
    Wang, Xiaoyan
    Li, Jie
    Peng, Xiaoning
    Zou, Beiji
    [J]. 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [7] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [8] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    V. Gomathy
    Neelamadhab Padhy
    Debabrata Samanta
    M. Sivaram
    Vishal Jain
    Iraj Sadegh Amiri
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4995 - 5001
  • [9] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    [J]. Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [10] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559