keyboard_arrow_up
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove Vulnerabilities in Wireless Sensor Networks

Authors

Bharat Bhushan1, Keshav Kaushik2 and G Sahoo1, 1BIT Mesra, India and 2HMRITM, India

Abstract

Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for multi applications which lead to proposal of Concealed Data Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it provides secure counting ability. In wireless sensor networks SN are unarmed and are susceptible to attacks. Considering the defence aspect of wireless environment we have used DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for augmentation of security and throughput. To prove our proposed scheme’s robustness and effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.

Keywords

Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.

Full Text  Volume 6, Number 9