Security in Wireless Sensor Networks : Data Aggregation

Authors

  • Abhishek Nigam  Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India
  • Saurabh Jaiswal  Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India
  • Neha Agarwal  Department of Computer Science and Engineering, Sri Ramswaroop University, Lucknow, India

Keywords:

Wireless sensor networks, data aggregation, routing protocols, LEACH and SPIN, Jamming

Abstract

Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, Data Aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. Data-centric technologies are needed that perform in-network aggregation of data to yield energy-efficient dissemination. In this paper we model jamming prevention techniques and compare its performance with traditional prevention techniques. In the proposed work source-destination placement and communication network density on the energy costs and delay associated with data aggregation. In my proposed work, defense strategies offers significant performance gains across a wide range of operational scenarios. The main goal of defense strategies algorithms is to gather and protect jamming areas in an energy efficient manner so that network lifetime is enhanced.

References

  1. Xu W, Trappe W, Zhang Y, Wood T: The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005). New York,USA; May 2005:46-57.
  2. Bayrataroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B: On the performance of IEEE 802.11 under jamming. In Proceedings of the 27th Conference on Computer Communications(INFOCOM ’08). Phoenix AZ, USA; 13–18 Apr 2008.
  3. Hamieh A, Ben-Othman J: Detection of jamming attacks in wireless Ad Hoc networks using error distribution. In International Conference on Communications (ICC ’09). Dresden, Germany; 14–18 Jun 2009:1-6.
  4. Zou X, Deng J: Detection of fabricated CTS packet attacks in wireless LANs. In Proceedings of the 7th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE ’10). Houston,USA; 17–19 Nov 2010:105-115.
  5. Zou X, Deng J: Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANS. In Proceeding of the 6thInternational Wireless Communications and Mobile Computing Conference. New York: ACM; 2010:57-61.
  6. Yu M, Su W, Zhou M: A new approach to detect radio jamming attacks in wireless networks. In International Conference on Networking Sensing and Control. Chicago,USA; 10–12 Apr 2010:721-726.
  7. Thuente D, Acharya M: Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings of the IEEE MILCOM IEEE. NJ, USA: Piscataway; 2006:1075-1081.
  8. Wikipedia . Accessed 23 Jun 2012 http://en.wikipedia.8. org/wiki/Shot Hussain A, Saqib NA: Protocol aware shot-noise based radio frequency jamming method in 802.11 networks. In Proceedings of the 8th International Conference on Wireless and Optical Communications Networks. Paris,France; 24–26 May 2011:1-6.
  9. Pelechrinis K, Iliofotou M, Krishnamurthy V: Denial of service attacks in wireless networks: the case of jammers. Communications Surveys and Tutorials 2010, 13: 245-257.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Abhishek Nigam, Saurabh Jaiswal, Neha Agarwal, " Security in Wireless Sensor Networks : Data Aggregation, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.50-54, May-June-2017.