Abstract To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed.Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data aggregation. Hence aggregation process in WSN should be optimized in energy efficient manner. There are some computational technics to implement aggrigation at cluster head and base station. When sensors are deployed at differet locations in wider area, it is possible to compromising attacks by adversaries. false data injected in compromised sensors during data aggregation process which results in false decision making at the Base Station (BS). Simple average data aggregation process is suitable only in attacker free environment.So to filter the false data during data aggregation, induced by the attacker. For every round of data agg.regation need to observe the behavior of nodes.So that it easy to minimize an impact of attacker contribution at the final result.For secure data aggregation process along with trustworthiness estimation using Trust wEighted Secure Data Aggregation algorithm (TESDA). Data aggregation process is optimized by performing aggregation in energy efficient manner through clustering. If the aggregator is compromised, then it affects entire aggregation accuracy. Hence it is necessary to propose a aggregation protocol that is resilient against compromised sensor and compromised aggregator in energy efficient and secure manner.
[1]
Reza Azarderakhsh,et al.
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
,
2011,
EURASIP J. Wirel. Commun. Netw..
[2]
Yang Xiao,et al.
Secure data aggregation in wireless sensor networks: A comprehensive overview
,
2009,
Comput. Networks.
[3]
T. Kavitha,et al.
Security Vulnerabilities In Wireless Sensor Networks: A Survey
,
2010
.
[4]
Robert H. Deng,et al.
Secure localization with attack detection in wireless sensor networks
,
2011,
International Journal of Information Security.
[5]
Chun Chen,et al.
Privacy-Preserving Universal Authentication Protocol for Wireless Communications
,
2011,
IEEE Transactions on Wireless Communications.