Trust based Data Aggregation in Wireless Sensor Networks

trust based data aggregation scheme is secure and it provides both integrity confidentiality and authenticity for homogeneous and heterogeneous networks and this scheme evaluate the malicious behavior of the nodes. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads can directly aggregate the cipher texts without decryption. In this design an encryption and signature techniques are used and also the base station can recover all sensing data even these data has been aggregated.The base station can perform any aggregation function on them. Without compromising any nodes an attacker can interrupt the network system. The hierarchical trust management protocol detects the malicious behavior of the nodes. It is based on four trust components intimacy, honesty, energy, unselfishness of the nodes. It maintains two levels of trust SN-level trust and CH-level trust

[1]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[2]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[3]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[4]  Dongyan Xu,et al.  Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[5]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[6]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[7]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[8]  H. Cam,et al.  SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.