Ensuring Higher Security for Gathering and Economically Distributing the Data in Social Wireless Sensor Networks

Abstract Wireless Sensor Networks(WSNs) is spatially distributed in sensor nodes without relay. A Mobile Data Investor, M-Investor is used to gather the data from sensor node and upload the data into data sink. When one M-Investor is moving, gathers the data from each and every nodes of entire network and upload the data into data sink. Also it raises distance/time constraints. The proposed system uses multiple M-Investors that are formed by portioning a network into a number of small sub networks. Each of them gathers the data by dynamically moving through a number of smallest sub tours in the entire network, upload the data into a data sink and it reduces distance/time constraints. The proposed system introduces supportive caching policies for minimizing electronic Data provisioning cost in Social Wireless Sensor Networks (SWSNET). SWSNETs are formed by mobile data investor, such as data enabled phones, electronic book readers etc., sharing common interests in electronic content, and physically gathering together in public places. Electronic object caching in such SWSNETs are shown to be able to reduce the Data provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including Data providers (DP), network service providers, and End Customers (EC).

[1]  Yuanyuan Yang,et al.  Tour Planning for Mobile Data-Gathering Mechanisms in Wireless Sensor Networks , 2013, IEEE Transactions on Vehicular Technology.

[2]  Charles Ofria,et al.  Distributed Cooperative Caching in Social Wireless Networks , 2013, IEEE Transactions on Mobile Computing.

[3]  Chun-Shien Lu,et al.  MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[4]  P. C. Wang,et al.  A New Access Control Method Using Prime Factorisation , 1992, Comput. J..

[5]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[6]  Ravi Prakash,et al.  Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[7]  Ossama Younis,et al.  Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.

[8]  Peng Ning,et al.  Securing network access in wireless sensor networks , 2009, WiSec '09.

[9]  Yuanyuan Yang,et al.  Energy-Efficient Multihop Polling in Clusters of Two-Layered Heterogeneous Sensor Networks , 2008, IEEE Transactions on Computers.

[10]  Tarek F. Abdelzaher,et al.  Design and Comparison of Lightweight Group Management Strategies in EnviroSuite , 2005, DCOSS.

[11]  Yuanyuan Yang,et al.  Energy efficient multi-hop polling in clusters of two-layered heterogeneous sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[12]  Raheem A. Beyah,et al.  SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Chao Yang,et al.  Energy efficient clustering for WSN-based structural health monitoring , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[15]  Philippas Tsigas,et al.  ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.

[16]  S Anguraj,et al.  A REFINEMENT FOR SECURE DATAGATHERING IN WIRELESS SENSOR NETWORKS , 2014 .

[17]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  C.-S. Lu,et al.  Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.