AN EFFORT TO DETERMINE CREDIBILITY AND STATUS OF SENSOR NODES

K. Leela Rani, P Ravindra Kumar

Abstract


Iterative filtering algorithms hold great promise for this type of purpose. Because of limited computational power and sources, aggregation of information from multiple sensor nodes done in the aggregating node is generally accomplished by simple methods for example averaging. Within this paper we show several existing iterative filtering algorithms, while considerably better quality against collusion attacks compared to simple averaging methods, are nonetheless susceptive to some novel sophisticated collusion attack we introduce. However such aggregation is proven to be highly susceptible to node compromising attacks. Because the performance of really low power processors dramatically improves, future aggregator nodes will manage to performing modern-day data aggregation algorithms, thus making WSN less vulnerable. Thus, ascertaining standing of data and status of sensor nodes is vital for WSN. Such algorithms concurrently aggregate data from multiple sources and supply trust assessment of those sources, usually in a kind of corresponding weight factors allotted to data supplied by each source. To deal with this security issue, we advise a noticeable difference for iterative filtering techniques by supplying a preliminary approximation for such algorithms causing them to be not just collusion robust, but additionally better and faster converging.


Keywords


Wireless Sensor Networks; Robust Data Aggregation; Collusion Attacks

References


H.-L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, “Energy efficient and fault tolerant multicore wireless sensor network: E2MWSN,” in Proc. 7th Int. Conf. Wireless Commun., Netw. Mobile Comput., 2011, pp. 1–4.

L. Wasserman, All of Statistics : A Concise Course in Statistical Inference. New York, NY, USA: Springer,.

M. Li, D. Ganesan, and P. Shenoy, “PRESTO: Feedback-driven data management in sensor networks,” in Proc. 3rd Conf. Netw. Syst. Des. Implementation, vol.3, 2006, pp. 23–23.

C. T. Chou, A. Ignatovic, and W. Hu, “Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 8, pp. 1525–1534, Aug. 2013.

E. Ayday, H. Lee, and F. Fekri, “An iterative algorithm for trust and reputation management,” Proc. IEEE Int. Conf. Symp. Inf. Theory, vol. 3, 2009, pp. 2051–2055.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.