Security in Wireless Sensor Networks : Data Aggregation

Authors(3) :-Abhishek Nigam, Saurabh Jaiswal, Neha Agarwal

Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, Data Aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. Data-centric technologies are needed that perform in-network aggregation of data to yield energy-efficient dissemination. In this paper we model jamming prevention techniques and compare its performance with traditional prevention techniques. In the proposed work source-destination placement and communication network density on the energy costs and delay associated with data aggregation. In my proposed work, defense strategies offers significant performance gains across a wide range of operational scenarios. The main goal of defense strategies algorithms is to gather and protect jamming areas in an energy efficient manner so that network lifetime is enhanced.

Authors and Affiliations

Abhishek Nigam
Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India
Saurabh Jaiswal
Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India
Neha Agarwal
Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India

Wireless sensor networks, data aggregation, routing protocols, LEACH and SPIN, Jamming

  1. Xu W, Trappe W, Zhang Y, Wood T: The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005). New York,USA; May 2005:46-57.
  2. Bayrataroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B: On the performance of IEEE 802.11 under jamming. In Proceedings of the 27th Conference on Computer Communications(INFOCOM ’08). Phoenix AZ, USA; 1318 Apr 2008.
  3. Hamieh A, Ben-Othman J: Detection of jamming attacks in wireless Ad Hoc networks using error distribution. In International Conference on Communications (ICC ’09). Dresden, Germany; 1418 Jun 2009:1-6.
  4. Zou X, Deng J: Detection of fabricated CTS packet attacks in wireless LANs. In Proceedings of the 7th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE ’10). Houston,USA; 1719 Nov 2010:105-115.
  5. Zou X, Deng J: Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANS. In Proceeding of the 6thInternational Wireless Communications and Mobile Computing Conference. New York: ACM; 2010:57-61.
  6. Yu M, Su W, Zhou M: A new approach to detect radio jamming attacks in wireless networks. In International Conference on Networking Sensing and Control. Chicago,USA; 1012 Apr 2010:721-726.
  7. Thuente D, Acharya M: Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings of the IEEE MILCOM IEEE. NJ, USA: Piscataway; 2006:1075-1081.
  8. Wikipedia . Accessed 23 Jun 2012 http://en.wikipedia.8. org/wiki/Shot Hussain A, Saqib NA: Protocol aware shot-noise based radio frequency jamming method in 802.11 networks. In Proceedings of the 8th International Conference on Wireless and Optical Communications Networks. Paris,France; 2426 May 2011:1-6.
  9. Pelechrinis K, Iliofotou M, Krishnamurthy V: Denial of service attacks in wireless networks: the case of jammers. Communications Surveys and Tutorials 2010, 13: 245-257.

Publication Details

Published in : Volume 3 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 50-54
Manuscript Number : IJSRSET17331
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Abhishek Nigam, Saurabh Jaiswal, Neha Agarwal, " Security in Wireless Sensor Networks : Data Aggregation, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.50-54, May-June-2017.
Journal URL :

Article Preview