Manuscript Number : IJSRSET184430
Secure Data Aggregation Scheme in Wireless Sensor Network
Authors(6) :-Prof. Kalyani Pendke, Anshula Dupare, Ashwini Khadatkar, Neha Pawar, Nikita Wadhwani, Rasika Salodkar
In wireless sensor networks, data aggregation assumes an essential part in diminishing vitality utilization. As of late, explore has concentrated on secure data aggregation because of the open and unfriendly condition conveyed. The Homomorphic Encryption (HE) conspire is widely used to secure data classification. Be that as it may, HE-based data aggregation plans have the accompanying disadvantages: flexibility, unapproved aggregation, and constrained aggregation capacities. To take care of these issues, we propose a secure data aggregation plot by consolidating homomorphic encryption innovation with a mark conspire. To answer this issue we presented a system speaks to a strategy in that powerful cluster head is picked based on the separation from the base station and remaining vitality. Subsequent to choosing the cluster head, it influences utilization of minor measure of vitality of sensor to network and in addition enhances the lifetime of the network of sensor network. Aggregation of the data got from the cluster individuals is obligation of cluster head in the cluster. Confirmation of data is finished by the cluster head preceding the data aggregation if data got isn't legitimate at that point got data is disposed of. Just confirmed data is taken for aggregation at cluster head. Encryption is finished by making utilization of homomorphic encryption technique and additionally encoded data send to the cluster head and data decoding is performed by base station (BS) for offering end to end security. An ID based mark system is created for hop by hop authentication. In this paper, we show the technique for recuperating the data which is lost because of the cushion flood. In given system cache memory is given by the cluster head to recuperation of data misfortune. Finally test comes about shows relying upon parameter like time and additionally vitality utilization on Jung test system that system exhibited is great contrasted with the accessible system.
Prof. Kalyani Pendke
Sensor Nodes,Cluster Head, Base Station,Wireless Sensor Networks, Cache Based System, Hop by hop authentication.
Publication Details
Published in :
Volume 4 | Issue 4 | March-April 2018 Article Preview
Assistant Professor, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Anshula Dupare
BE Students, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Ashwini Khadatkar
BE Students, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Neha Pawar
BE Students, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Nikita Wadhwani
BE Students, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Rasika Salodkar
Assistant Professor, Department of Computer science and Engineering Rajiv Gandhi College of Engineering &Research, Nagpur, Maharashtra, India
Date of Publication :
2018-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
200-209
Manuscript Number :
IJSRSET184430
Publisher : Technoscience Academy
Journal URL :
https://ijsrset.com/IJSRSET184430