Full Paper View Go Back
U. Korupolu1 , S. Kartik2 , GK. Chakravarthi3
Section:Review Paper, Product Type: Isroset-Journal
Vol.4 ,
Issue.3 , pp.26-29, Jun-2016
Online published on Jul 02, 2016
Copyright © U. Korupolu, S. Kartik, GK. Chakravarthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi, “An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.3, pp.26-29, 2016.
MLA Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks." International Journal of Scientific Research in Computer Science and Engineering 4.3 (2016): 26-29.
APA Style Citation: U. Korupolu, S. Kartik, GK. Chakravarthi, (2016). An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks. International Journal of Scientific Research in Computer Science and Engineering, 4(3), 26-29.
BibTex Style Citation:
@article{Korupolu_2016,
author = {U. Korupolu, S. Kartik, GK. Chakravarthi},
title = {An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {3},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {26-29},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=279},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=279
TI - An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - U. Korupolu, S. Kartik, GK. Chakravarthi
PY - 2016
DA - 2016/07/02
PB - IJCSE, Indore, INDIA
SP - 26-29
IS - 3
VL - 4
SN - 2347-2693
ER -
Abstract :
The basic component in wireless sensor networks (WSNs) is represented by the nodes. The sensor node consumes energy during sensing, processing and transmission. The aggregation of data from multiple sensor nodes which is done at the aggregating node is to be performed by simple method such as averaging. In Wireless sensor network power and energy resources are limited. In this paper the monitoring system and READA technique will be used. The number of sensor nodes can detect simultaneously a single target of interest. Redundant and correlated data are collected. If every node sends data to the base station, energy will be wasted and due to that the network energy will be consume quickly. Redundancy Elimination for Accurate Data Aggregation (READA) uses a grouping and compression mechanism to remove duplicate data in the aggregated set of data to be sent to the base station without losing large accuracy of the final aggregated data. In wireless sensor network, security and energy efficiency issues are found.
Key-Words / Index Term :
Wireless Sensor Networks; Network Lifetime; Collision attack; Data Aggregation techniques
References :
[1]. P. saini, M. Sharma, "Impact of Multimedia Traffic on Routing Protocols in MANET", IJSR in Network Security and Communication, Vol.3, Issue.3, pp.1-5, 2015,
[2]. L. Pal, P. Sharma, N. Kaurav, S.L. Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4,2013.
[3]. R. Nathiya, S.G. Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.36-43, 2014.
[4]. H. Singh, "Randomly Generated Algorithms and Dynamic Connections", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.1-4, 2014.
[5]. O. Hiteshreddy, P. Singh, S. Chahuan, "A Review on Cluster Based Data Aggregation Protocols in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.37-45, 2015.
[6]. D. Tamrakar, S. Bhattacharya, S. Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.2, 1-5, 2014.
[7]. Md.A. Mushtaque, "Comparative Analysis on Different parameters of Encryption Algorithms for Information Security", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.76-82, 2014.
[8]. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Translation Journal on Magnetics in Japan, Vol. 2, Issue.8, pp.740–741, 1987.
[9]. R. Sharma, Heena Das, S.N. Das, "WSN for Computerized Irrigation System in Tea Gardens", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.26-30, 2016.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.