Open Access Open Access  Restricted Access Subscription or Fee Access

Reliable Data Collection Method for Remote Sensor Systems in the Vicinity of Collusion Assaults

Pranav Bhushan

Abstract


Because of constrained computational power and vitality assets, collection of information from different sensor nodes done at the base aggregating node is normally done by basic techniques like averaging. Nevertheless, such aggregation is known to be highly prone to node compromising attacks. Since WSN are generally neglected and without tinker resistant hardware, they are very much prone to such assaults. Thus, deciding believability of data and reputation or of sensor nodes is essential for WSN. As the execution of low power processors considerably enhances, future aggregator nodes will be equipped for performing more advanced and complex data accumulation algorithms, therefore making prone. Iterative filtering algorithms hold guarantee for such a reason. These algorithms consequently collect data from different sources and give trust appraisal of these sources, as a type of corresponding weight components allotted to information gave by every source. Through this paper, I exhibit that few existing iterative filtering algorithms, while fundamentally more robust and resilient against collusive assaults than the straightforward averaging strategies, are nevertheless prone to a novel advanced assault presented. For addressing the security thing, an improvement is proposed for iterative strategies by giving an underlying guess to such calculations which is making them not just collusion resilient, additionally more exact and speedier uniting or converging.


Keywords


Constrained Computational Power, Vitality Assets, Averaging, Compromising Attacks, Tinker Resistant Hardware, Resilient, WSN, Iterative Filtering Algorithms, Assaults

Full Text:

PDF

References


S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview,” Comput. Netw., vol. 53, no. 12, pp. 2022–2037, Aug. 2009.

A. Jøsang and J. Golbeck, “Challenges for robust trust and reputation systems,” in Proc. 5th Int. Workshop Security Trust Manage., Saint Malo, France, 2009, pp. 253–262.

R. Roman, C. Fernandez-Gago, J. Lopez, and H. H. Chen, “Trust and reputation systems for wireless sensor networks,” in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, and C. Skianis, eds.,Leicester, U.K.: Troubador Publishing Ltd, 2009 pp. 105–128.

Y. Zhou, T. Lei, and T. Zhou, “A robust ranking algorithm to spamming,” Europhys. Lett, vol. 94, p. 48002, 2011.

C. de Kerchove and P. Van Dooren, “Iterative filtering in reputation systems,” SIAM J. Matrix Anal. Appl., vol. 31, no. 4, pp. 1812–1834, Mar. 2010.

Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867–880, 2012.

M. Rezvani, A. Ignjatovic, E. Bertino, and S. Jha, “Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks,” School Comput. Sci. and Eng., Univ. New South Wales, Kensington, NSW, Australia, Tech. Rep. UNSW-CSE-TR-201319, Jul. 2013.

S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1040–1052, Jun. 2012.

R.-H. Li, J. X. Yu, X. Huang, and H. Cheng, “Robust reputation based ranking on bipartite rating networks,” in Proc. SIAM Int. Conf. Data Mining, 2012, pp. 612–623.

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-rotaru, and H. Rubens, “Mitigating byzantine attacks in ad hoc wireless networks,” Dept. Comput. Sci., Johns Hopkins Univ., Baltimore, MD, USA, Tech. Rep., 2004.

(2004). The Intel lab data Data set [Online]. Available: http:// berkeley.intel-research.net/labdata/

D. Wagner, “Resilient aggregation in sensor networks,” in Proc. 2nd ACM Workshop Security Ad Hoc Sens. Netw., 2004, pp. 78–87.

P. Laureti, L. Moret, Y.-C. Zhang, and Y.-K. Yu, “Information filtering via iterative refinement,” Europhys. Lett, vol. 75, pp. 1006– 1012, Sep. 2006.

Y.-K. Yu, Y.-C. Zhang, P. Laureti, and L. Moret, “Decoding information from noisy, redundant, and intentionally distorted sources,” Physica A: Statist. Mech. Appl., vol. 371, pp. 732–744, Nov. 2006.

E. Ayday, H. Lee, and F. Fekri, “An iterative algorithm for trust and reputation management,” Proc. IEEE Int. Conf. Symp. Inf. Theory, vol. 3, 2009, pp. 2051–2055.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.