vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff3e572b0000004426060001000100 Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.
M Babu1, M Ramkumar2, M Shenbagapriya3 Gnanamani College of Technology, India1,2, Sri Satya Sai University of Technology and Medical Sciences, India3
Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals
January | February | March | April | May | June | July | August | September | October | November | December |
1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 10 , Issue: 4 , Pages: 2067-2072 )
Date of Publication :
December 2019
Page Views :
233
Full Text Views :
4
|