Optimization Wireless Sensor Network (WSN) is necessary to reduce redundancy and energy consumption. To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed. Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data aggregation. Hence aggregation process in WSN should be optimized in energy efficient manner. When sensors are deployed at differet locations in wider area, it is possible to compromising attacks by adversaries. false data injected in compromised sensors during data aggregation process which results in false decision making at the Base Station (BS). Simple average data aggregation process is suitable only in attacker free environment. So to filter the false data during data aggregation, induced by the attacker. For every round of data agg.regation need to observe the behavior of nodes. So that it easy to minimize an impact of attacker contribution at the final result. For secure data aggregation process along with trustworthiness estimation using Trust wEighted Secure Data Aggregation algorithm (TESDA). Data aggregation process is optimized by performing aggregation in energy efficient manner through clustering If the aggregator is compromised, then it affects entire aggregation accuracy. Hence it is necessary to propose a aggregation protocol that is resilient against compromised sensor and compromised aggregator in energy efficient and secure manner.
[1]
Catherine Rosenberg,et al.
A Taxonomy-based Approach to Design of Large-scale Sensor Networks
,
2008
.
[2]
Hafizur Rahaman,et al.
EER: Energy Efficient Routing in Wireless Sensor Networks
,
2011,
IEEE Technology Students' Symposium.
[3]
A.E. Kamal,et al.
Data aggregation in wireless sensor networks - exact and approximate algorithms
,
2004,
2004 Workshop on High Performance Switching and Routing, 2004. HPSR..
[4]
JAMAL N. AL-KARAKI,et al.
Routing techniques in wireless sensor networks: a survey
,
2004,
IEEE Wireless Communications.
[5]
Mohamed F. Younis,et al.
A survey on routing protocols for wireless sensor networks
,
2005,
Ad Hoc Networks.
[6]
Sriram Chellappan,et al.
Secure Data Aggregation in Sensor Networks
,
2009
.
[7]
Sasikanth Avancha,et al.
Security for Sensor Networks
,
2004
.
[8]
Yi Shang,et al.
A survey on network protocols for wireless sensor networks
,
2003,
International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..