Implementation of Data Aggregation and Authentication in Wireless Sensor Networks
S. Chaitanya Rami Reddy1, P. Ravinder Kumar2
1Mr. S.Chaitanya Rami Reddy, Dept of ECE, JNT University/ JPNCE/Mahabubnagar,India.
2Mr. P.Ravinder Kumar, Dept of ECE,JNT University/ JPNCE,Mahabubnagar,India.
Manuscript received on November 01, 2012. | Revised Manuscript received on November 02, 2012. | Manuscript published on November 05, 2012. | PP: 122-126 | Volume-2 Issue-5, November 2012. | Retrieval Number: E1021102512/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery and eavesdropping. Sensor nodes can be compromised by intruders and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and degrades the bandwidth utilization . False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying. In this paper it has been assumed that some sensor nodes are selected dynamically as data aggregators and the nodes between two consecutive data aggregators are called forwarding nodes simply because they forward data. To detect false data injected by a data aggregator while performing data aggregation, some neighbouring nodes of the data aggregator (called monitoring nodes) also perform data aggregation and compute MACs for the aggregated data to enable their pair mates to verify the data later. This project presents a Data Aggregation and Authentication protocol, called DAA, to integrate false data detection with data aggregation and confidentiality. To support data aggregation along with false data detection, the monitoring nodes of every data aggregator also conduct data aggregation and compute the corresponding small-size message authentication codes for data verification at their pair mates. This project introduces a data aggregation and authentication protocol (DAA) to provide false data detection and secure data aggregation against up to T compromised sensor nodes, for T>=1. The value of T depends on security requirements, node density, packet size and the amount of tolerable overhead. Microsoft C#.NET programming language is used to implement the Data aggregation and authentication protocol. The front end of the protocol is designed using Visual Studio2005.
Keywords: Authentication, Data aggregation, Data integrity, Network- level security, Sensor networks.