Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-25 Number-2
Year of Publication : 2015
Authors : K.Bhagya Sri, A.Srinivasan
DOI :  10.14445/22312803/IJCTT-V25P116


K.Bhagya Sri, A.Srinivasan "Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V25(2):86-90, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Data Aggregation in moderate hubs (called aggregator hubs) is a viable methodology for streamlining utilization of rare assets like data transfer capacity and vitality in Remote Sensor Networks (WSNs). Then again, insystem preparing represents an issue for the protection of the sensor information since individual information of sensor hubs should be known not aggregator hub before the collection procedure can be conveyed out. In utilizations of WSNs, protection protecting information collection has turn into a critical prerequisite due to delicate nature of the sensor information. This paper proposes a conventions and plans for this reason called CPDA - for completing added substance information collection in a protection saving way for application in WSNs. The plan has been very prevalent and surely understood. Regardless of the popularity of this convention, it has been found that the convention is powerless against assault and it is likewise not vitality productive. In this paper, we first present a brief best in class review on the present protection protecting information conglomeration conventions for WSNS. At that point we portray the CPDA convention and recognize its security weakness. At last, we exhibit how the convention can be made secure and vitality productive.

[1] T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor NetworkTechnologies for the Information Explosion Era, Stud. Comput.Intell.Springer-Verlag, 2010, vol. 278.
[2] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issuesin Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8,no. 2, pp. 2–23, 2006.
[3] A. A. Abbasi and M. Younis, “A survey on clustering algorithms forwireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp.2826–2841, 2007.
[4] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “AnApplication-Specific Protocol Architecture for Wireless MicrosensorNetworks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,2002.
[5] A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using EnhancedbAPTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp.1290–1302, 2002.
[6] S. Yi, J. Heo, Y. Cho et al., “PEACH: Power-efficient and adaptiveclustering hierarchy protocol for wireless sensor networks,” Comput.Commun., vol. 30, no. 14-15, pp. 2842–2852, 2007.
[7] K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and Implementa-tion Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput.Applications, vol. 47, no. 11, pp. 23–28, 2012.
[8] L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACHOn thesecurity of clustered sensor networks,” Signal Process., vol. 87, pp.2882–2895, 2007.
[9] P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performanceanalysis of a secure clustering protocol for sensor networks,” in Proc.IEEE NCA, 2007, pp. 145–152.
[10] K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol forCluster-Based Wireless Sensor Networks Using Group Key Manage-ment,” in Proc. WiCOM, 2008, pp. 1–5.
[11] S. Sharma and S. K. Jena, “A Survey on Secure Hierarchical RoutingProtocols in Wireless Sensor Networks,” in Proc. ICCCS, 2011, pp.146–151.
[12] G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks,”in Proc. IEEE PerCom Workshops, 2005, pp. 146–150.
[13] W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEETrans. Inf. Theory, vol. 22, no. 6, pp. 644– 654, 1976.
[14] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” inLect. Notes.Comput. Sc. - CRYPTO, 1985, vol. 196, pp. 47–53.
[15] D. W. Carman, “New Directions in Sensor Network Key Management,”Int. J. Distrib. Sens. Netw., vol. 1, pp. 3–15, 2005.

wireless sensor network, privacy, data aggregation, cluster-based private data aggregation (CPDA); key distribution, collusion attack, malicious node