Eliminating False Data and Improving Network Lifetime Using Mobile Data Collector in Wireless Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


False data elimination during data aggregation and transmission is important in ensuring data integrity in wireless sensor networks. The existing security mechanisms do not address the uneven battery drain due to funneling effect. In this paper, False Data Elimination - Mobile Data Collector scheme is proposed to eliminate the injected false data by multiple compromised nodes during data aggregation and transmission and to resolve the uneven battery drain due to funneling effect by using a mobile data collector.  It ensures confidential data transmission and provides immunity against many attacks. Simulations indicate that it has a higher false data filtering capacity, lesser energy consumption and improved network lifetime
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Data Aggregation; False Data Elimination; Funneling Effect; Mobile Data Collector; Network Lifetime; Wireless Sensor Networks

Full Text:

PDF


References


F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks, Vol. 38, pp.393–422, 2002

Saamaja Vupputuri, Kiran K. Rachuri, Siva Ram Murthy, C., On providing event reliability and maximizing network lifetime using mobile Data-Collectors in Wireless Sensor Networks, Proceedings of the Int. Conf. High Performance Computing (Page: 160-169 Year of Publication:2009).

Ye, F., Luo, H., Lu, S., Zhang, L., Statistical en-route detection and filtering of injected false data in sensor networks. Proceedings of IEEE INFOCOM (Page: 2446–2457 Year of Publication: 2004).

S. Zhu, S. Setia, S. Jajodia, P. Ning, Interleaved hop-by-hop authentication against false data injection attacks in sensor networks, ACM Trans. Sensor Networks, Vol.3, No.3, 2007.

Yang, H., Lu, S., Commutative cipher based en-route filtering in wireless sensor networks, Proceedings of IEEE VTC (Page: 1223–1227 Year Of publication: 2004).

Yu, Z., Guan, Y., A dynamic en-route scheme for filtering false data in wireless sensor networks, Proceedings of IEEE INFOCOM (Page: 1–12 Year of Publication: 2006).

J. Li, L. Yu, H. Gao, S. Xiong, Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 5, pp. 881-889, 2012.

Przydatek, B., Song, D., Perrig, A., SIA: Secure information aggregation in sensor networks, Proceedings of SenSys’03 (Page: 255-265 Year of Publication: 2003).

Du, W., Deng, J., Han, Y. S., Varshney, P. K., A witness-based approach for data fusion assurance in wireless sensor networks, Proceedings of GLOBECOM’03 (Page: 1435-1439 Year of Publication: 2003).

K. Wu, D. Dreef, B. Sun, Y. Xiao, Secure data aggregation without persistent cryptographic operations in wireless sensor networks, Ad Hoc Networks, Vol. 5, No. 1,pp. 100-111, 2007.

Yang, Y., Wang, X., Zhu, S., Cao, G., SDAP: A Secure hop-by-hop Data Aggregation Protocol for sensor networks, Proceedings of ACM MOBIHOC’06 (Year of Publication: 2006).

S. Roy, M. Conti, S. Setia, S. Jajodia, Secure Data Aggregation in Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 1040-1052, 2012.

S. Ozdemir, H. Cam, Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks, IEEE/ACM trans. Networking, Vol. 18, No.3, pp.736-739, 2010.

A.S. Poornima, B.B. Amberker, Secure data collection using mobile data collector in clustered wireless sensor networks. IET Wireless Sensor Systems, Vol. 1, No. 2, pp. 85–95, 2011.

Zhou, L., Ni, J., Ravishankar, C. V., Supporting secure communication and data collection in mobile sensor networks, Proceedings of 25th IEEE Int. Conf. on Computer Communications (Page: 1–12 Year of Publication: 2006).

Rasheed, A., Mahapatra, R., Secure data collection scheme in wireless sensor networks with mobile sink, Proceedings of Seventh IEEE Int. Symp. Network Computing Applications (Year of Publication: 2008).

Atta ur Rehman Khan, Sajjad A. Madani, Khizar Hayat, Samee Ullah Khan, Clustering-based power-controlled routing for mobile wireless sensor networks. Int. J Communication Systems, Vol. 25, No.4, pp. 529–542, 2012.

Nithya, V., Ramachandran, B., Improving network life time of wireless sensor network using LT codes under erasure environment, (2013) International Review on Computers and Software (IRECOS), 8 (10), pp. 2349-2355.

K. Thanigaivelu, K. Murugan, Grid-based Clustering with Predefined Path Mobility for Mobile Sink Data Collection to Extend Network Lifetime in Wireless Sensor Networks, IETE Technical Review, Vol. 29, No.2, pp.133-147, 2012.

Fan Bai, Kumudu S. Munasinghe, Abbas Jamalipour, Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading, Int. J Communication Systems, Vol. 24, No.5, pp. 628–646, 2011.

Sirivianos, M., Westhoff, D., Armknecht, F., Girao, J., Non-manipulable aggregator node election protocols for wireless sensor networks. Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (Year of Publication: 2007).

Du, W., Deng, J., Han, Y. S., Varshney, P. K., A pairwise key predistribution scheme for wireless sensor networks, Proceedings of 10th ACM CCS (Page: 42–51 Year of Publication: 2003).

D. Liu, P. Ning, R. Li, Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Security, Vol. 8, No.1, pp. 41–77, 2005.

Newsome, J., Shi, E., Song, D., Perrig, A., The Sybil attack in sensor networks: Analysis and defenses, Proceedings of 3rd IEEE/ACMIPSN (Page: 259–268 Year of Publication: 2004).

E. Khan, E. Gabidulin, B. Honary, H. Ahmed, Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks, IET Wireless Sensor Systems, Vol. 2, No.2, pp.108 –114, 2012.

Shuai Gao, Hongke Zhang, Sajal K. Das, Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks, IEEE Trans. Mobile Computing, Vol.10, No.5, pp.592-608, 2011.

NS‑2 – The Network Simulator version 2.32 [online] Available from: http://www.isi.edu/nsnam/ns/ [Last accessed on 2011 Sep 12]

Bo-Chao Cheng, Hsi-Hsun Yeh, Ping-Hai Hsu, Schedulability Analysis for Hard Network Lifetime Wireless Sensor Networks with High Energy First Clustering, IEEE Trans. Reliability, Vol. 60, No.3, pp.675-688, 2011.

S. M. Mazinani, M. H. Yaghmaee, F. Tashtarian, M. T. Honary, J. Chitizadeh, On Global Clustering Algorithm: Layer-Oriented Approach for First/Last Node Dying Applications in Wireless Sensor Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (5), pp. 328-339.

Said Ben Alla, Abdellah Ezzati, A Qos-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

T. Shankar, S. Shanmugavel, A. Karthikeyan, Hybrid Approach for Energy Optimization in Wireless Sensor Networks Using PSO, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 221-226.

A. Maizate, N. El Kamoun, A New Metric Based Cluster Head Selection Technique for Prolonged Lifetime in Wireless Sensor Networks, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 227-236.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize