Academic Journals Database
Disseminating quality controlled scientific knowledge

Design & Implementation Of DAA Protocol

ADD TO MY LIST
 
Author(s): Mr.P.Anilkumar | Mr. K. Sudhakar

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 10;
Start page: 4519;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: DAA | Data integrity | network-level Security | confidentiality | aggregation | bandwidth.

ABSTRACT
False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying in wireless sensor networks. Since data aggregation is essential to reduce data redundancy to improve data accuracy, false data detection is critical to the provision of data integrity and efficient utilisation of battery power and bandwidth. To support confidential data transmission, the sensor nodes between two consecutive data aggregators verify the data integrity on the encrypted data rather than the plain data. Performance analysis as shows that DAA detects any false data injected up to ‘T’ compromised nodes, and that the detected false data are not forwarded beyond the next data aggregator on the path. Despite that false data detection and data onfidentiality increases the communication overhead; simulation results shows the DAA can still reduce the amount of transmitted data up to 60% with the help of data aggregation and early detection of false data. The main objectives of this paper are- false data detection, integrate the detection of false data with data aggregation and confidentiality, to present the novel security protocol DAA to integrate data aggregation, confidentiality and false data detection and to reduce the amount of transmitted data over the wireless sensor networks with the help of data aggregation and early data detection of false data, to a significant improvement in bandwidth utilisation and energy consumption. Compromised sensor nodes in wireless sensor networks, can distort the integrity of data by injecting false data. Previously known techniques on false data detection do not support data confidentiality and aggregations, even though they are usually essential to wireless sensor networks. However, this paper has presented the novel security protocol DAA to integrate data aggregation, confidentiality and false data detection.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions