Hybrid Approach For Data Aggregation in WSN With Advance Security Protocol in
Hybrid Approach For Data Aggregation in WSN With Advance Security Protocol in
Hybrid Approach For Data Aggregation in WSN With Advance Security Protocol in
Abstract: Energy efficiency is a crucial resource constrained WSN. Diverse techniques for example duty cycling, optimization
energy scheduling and data aggregation are applied so that energy can be used minimum. In this research paper there are two main
domains on which work carried out successfully. First one is data aggregation but data aggregation in our work is of two levels.
Another domain was security because as we know in MANET security is not up to the mark that is why unauthorized person can
access the data by deploying malicious note in our existing network. A robust analytical development of the proposed protocol is
presented by using concept of two level data aggregation. Quiet satisfactory performance of the proposed algorithm is depicted.
Data aggregation is attained by iteratively applying the proposed compression method at the cluster heads and on the other hand
data aggregation scheme in the presence of a Multi-interface Multi-Channel Routing Protocol is tested. One important thing is that
in a cluster. A node can be cluster head only single time after that new node will be cluster head. MMCR uses a metric defined by
various parameters like throughput, end-to-end delay and energy utilization to select Multi-Point Relay nodes to forward data
packets in each channel but keeping in mind that loss of packet or information must be reduced. Finally we can say that proposed
algorithm is far better than existed protocol. Besides that RSA security algorithm for encryption and decryption also applied so
that unauthorized person cannot access the information. There are various security algorithm available but selection must be
appropriate as per desired application.
Keywords- Data Aggregation, Security, Base Station, RSA, Quantization, MMCR, WSN
__________________________________________________*****_________________________________________________
Ani1, Yashpa1 Singh [2015]: Wire1ess Sensor Networks are Suchithra, Sumitha Thankachan [2015]: The researchers are
unique1y characterized by properties 1ike 1imited power they facing numerous unique cha11enges with the emergence of the
can harvest or store, dynamic network topo1ogy, 1arge sca1e sensor networks which is posing as one of the dominant
of dep1oyment. Sensor networks have a huge app1ication in techno1ogy trend in the current decade. The sensor networks
fie1d which inc1udes habitat monitoring, object tracking, which are 1ike1y composed of hundreds, and potentia11y
redetection, 1and s1ide detection and monitoring. Whi1e there thousands of tiny sensor nodes, function autonomous, in many
are many types of security attacks in WSNs, we have decided cases, without the access to the renewab1e energy resources.
to focus our ana1ysis on a particu1ar1y harmfu1 one: the Some important factors such as cost constraints need for
Sybi1 attack. A Sybi1 attack succeeds when a ma1icious node, ubiquitous and invisib1e dep1oyments wi11 a1so resu1t in the
ca11ed the Sybi1 node, i11egitimate1y c1aims mu1tip1e fa1se sma11 sized, resource-constrained sensor nodes. In this paper,
identities by either fabricating new identities or impersonating we concentrate on the security of Wire1ess Sensor Networks,
existing ones. The goa1 of a Sybi1 attack is to gain a since the set of cha11enges in the sensor networks are much
disproportionate amount of inf1uence over the network via its diverse in nature. We have made a depth threat ana1ysis of
fa1se identities. A detai1ed study of these methods has been Wire1ess Sensor Network and a1so propose some of the
carried out and comparison tab1e gives an overview of the countermeasures against these threats. We a1so propose some
method’s performance. Conc1usions have been drawn using of the security goa1s for the Wire1ess Sensor Network. In
the comparison tab1e. Parameters show how the method further, security is more important for the acceptance and the
performs. Simu1ation work is performed on NS2 simu1ator. usage of the sensor networks for as many app1ications.
We have imp1emented the simp1e form of Sybi1 attack and an
128
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 127 – 133
_______________________________________________________________________________________________
Nanthini.D and R.A.Rose1ine [2014]: In this article, we RSSI (Received Signal fury Information) the nodes engage
provide a review of existing approaches, techniques and their CH (Cluster Head). Now the node charge and became
protoco1s for aggregation in wire1ess sensor networks. husband and wife request message to the recommended CH.
Throughout this paper we discuss some of the various types of The tie charge message contains the CHs ID everywhere the
aggregation in Wire1ess Sensor Networking fie1d. Various node wants to join and by the same token it contains the nodes
protoco1s have been proposed to routing packets for ID.
faci1itating data aggregation. Genera11y the users require
on1y efficient aggregate functions. A sensor network may
consist of hundreds or thousands of 1ow-cost sensors. Each
acts as an information source, sensing and co11ecting data
from the environment for a given task [5].
III. METHODOLOGY
The proposed solution, called RSA for security. The main and
most important improvement in this proposed solution is based
on the concept of selection of Cluster Head and which node
sends the information when redundant data are detected. On
the other hand, by combining features of MMCR protocols is
allowed not to send the redundant data within a cluster and
among different iterations, i.e. redundancy is eliminated first
among nodes in the same cluster, and later from the same
nodes among consecutive iterations, thus we eliminate 100%
redundancy.
Simulation Result
End to End Delay
Energy Consumption
Figure11 Packet Delivery Ratio comparison
Throughput
REFERENCES
[1]. Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu,
Member, “An Efficient Distributed Trust Model for
Wireless Sensor Networks” IEEE, and Mohsen Guizani,
Fellow, IEEE Transactions On Parallel And Distributed
Systems, Vol. 26, No. 5, May 2015.
[2]. Mr.Rakesh, Kr.RanjanMrs., S.P.Karmore, “Survey on
Secured Data Aggregation in Wireless Sensor Network”
IEEE Sponsored 2nd International Conference on
Innovations in Information Embedded and Communication
Figure15 Selection of highest energy node and 2nd level Systems 2015.
aggregation [3]. Sumedha Sirsikar, Samarath Anavatti, “Issues of Data
Aggregatiom Methods in Wireless Sensor Network: A
Survey” in Proceedings of 4th International Conference on
Advances in Computing, Communication and Control
(ICAC3'15) Science direct 2015.
[4]. V.Vineel Kumar, K.Ananda Brahmi, “Data Aggregation
Using Synopsis Diffusion Approach In Wireless Sensor
Networks” International Journal of Innovative Engineering
Research (E-ISSN: 2349-882X) Vol 2, Issue 1, September
2014 .
[5]. Nanthini.D and R.A.Roseline, “Aggregation Protocols in
Wireless Sensor Network- A Survey“ by International
Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume 3 Issue 7, July 2014.
[6]. Mousam Dagar and Shilpa Mahajan, “Data Aggregation in
Wireless Sensor Network: A Survey”, International Journal
of Information and Computation Technology, Volume 3,
Number 3, 2013. ISSN 0974-2239
[7]. V.Umarani, K.Soma Sundaram, “Survey of Various Trust
Models and Their Behavior in Wireless Sensor Networks”,
International Journal of Emerging Technology and
Figure16 Sense data and choose nearest node in 2nd level
aggregation
132
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 127 – 133
_______________________________________________________________________________________________
Advanced Engineering, Volume 3, Issue 10, pp. 180-188, Wireless Ad Hoc Networks,‖ Proc. Of The IEEE Wireless
October 2013. Communications And Networking Conference, Pp. 1-6,
[8]. Sushruta Mishra and Hiren Thakkar, “Features of WSN and Apr 2009.
Data Aggregation techniques in WSN: A Survey ” [13]. S. Misra Et Al. (Eds.), Guide To Wireless Sensor
International Journal of Engineering and Innovative Networks, Computer Communications And Networks, Doi:
Technology (IJEIT) Volume 1, Issue 4, April 2012. 10.1007/978-1-84882-218-4 4, Springer-Verlag London
[9]. Nandini. S. Patil, Prof. P. R. Patil, “Data Aggregation in Limited 2009.
Wireless Sensor Network” in IEEE International [14]. Suman Nathy; Phillip B. Gibbons, Srinivasan Seshany,
Conference on Computational Intelligence and Computing Zachary R. Anderson, “Synopsis Diffusion for Robust
Research, 2010. Aggregation in Sensor Networks” ACM Transactions on
[10]. Kasirajan, Priya, Et Al. "Demonstration Of A Multi- Sensor Networks, Vol. V, No. N, September 2007.
Interface Multi-Channel Routing Protocol (Mmcr) For [15]. Wei Zhang, Sajal K. Das, and Yonghe Liu “A Trust Based
Wsns Using Missouri S&T Motes." Lcn Demo (2010). Framework for Secure Data Aggregation in Wireless
[11]. Suat Ozdemir , Yang Xiao ,“Secure data aggregation in Sensor Networks”, 3rd Annual IEEE Communications
wireless sensor networks: A comprehensive overview” Society on Sensor and Ad Hoc Communications and
Science direct Volume 53, Issue 12, August 2009. Networks, 2006
[12]. R. Anguswamy, M. Zawodniok And S. Jagannathan,―A
Multi-Interface Multichannel Routing (Mmcr) Protocol For
133
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________