SlideShare a Scribd company logo
Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
ABSTRACT:
Due to limited computational power and energy resources, aggregation of data
from multiple sensor nodes done at the aggregating node is usually accomplished
by simple methods such as averaging. However such aggregation is known to be
highly vulnerable to node compromising attacks. Since WSN are usually
unattended and without tamper resistant hardware, they are highly susceptible to
such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor
nodes is crucial for WSN. As the performance of very low power processors
dramatically improves, future aggregator nodes will be capable of performing more
sophisticated data aggregation algorithms, thus making WSN less vulnerable.
Iterative filtering algorithms hold great promise for such a purpose. Such
algorithms simultaneously aggregate data from multiple sources and provide trust
assessment of these sources, usually in a form of corresponding weight factors
assigned to data provided by each source. In this paper we demonstrate that several
existing iterative filtering algorithms, while significantly more robust against
collusion attacks than the simple averaging methods, are nevertheless susceptive to
a novel sophisticated collusion attack we introduce. To address this security issue,
we propose an improvement for iterative filtering techniques by providing an
initial approximation for such algorithms which makes them not only collusion
robust, but also more accurate and faster converging.
EXISTING SYSTEM:
 In recent years, there has been an increasing amount of literature on IF
algorithms for trust and reputation systems. The performance of IF
algorithms in the presence of different types of faults and simple false data
injection attacks has been studied where it was applied to compressive
sensing data in WSNs.
 In the past literature it was found that these algorithms exhibit better
robustness compared to the simple averaging techniques; however, the past
research did not take into account more sophisticated collusion attack
scenarios. If the attackers have a high level of knowledge about the
aggregation algorithm and its parameters, they can conduct sophisticated
attacks on WSNs by exploiting false data injection through a number of
compromised nodes.
DISADVANTAGES OF EXISTING SYSTEM:
 Although the existing IF algorithms consider simple cheating behaviour by
adversaries, none of them take into account sophisticated malicious
scenarios such as collusion attacks.
 Although the existing IF algorithms consider simple cheating behaviour by
adversaries, none of them take into account sophisticated malicious
scenarios such as collusion attacks.
PROPOSED SYSTEM:
 This paper presents a new sophisticated collusion attack scenario against a
number of existing IF algorithms based on the false data injection. In such
an attack scenario, colluders attempt to skew the aggregate value by forcing
such IF algorithms to converge to skewed values provided by one of the
attackers.
 In this paper, we propose a solution for vulnerability by providing an initial
trust estimate which is based on a robust estimation of errors of individual
sensors.
 Identification of a new sophisticated collusion attack against IF based
reputation systems which reveals a severe vulnerability of IF algorithms.
 A novel method for estimation of sensors’ errors which is effective in a wide
range of sensor faults and not susceptible to the described attack.
 Design of an efficient and robust aggregation method inspired by the MLE,
which utilises an estimate of the noise parameters obtained using
contribution above.
 Enhanced IF schemes able to protect against sophisticated collusion attacks
by providing an initial estimate of trustworthiness of sensors using inputs
from contributions
ADVANTAGES OF PROPOSED SYSTEM:
 We provide a thorough empirical evaluation of effectiveness and efficiency
of our proposed aggregation method. The results show that our method
provides both higher accuracy and better collusion resistance than the
existing methods.
 To the best of our knowledge, no existing work addresses on false data
injection for a number of simple attack scenarios, in the case of a collusion
attack by compromised nodes in a manner which employs high level
knowledge about data aggregation algorithm used.
SYSTEM ARCHITECTURE:
BLOCK DIAGRAM:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Mohsen Rezvani, Student Member, IEEE, Aleksandar Ignjatovic, Elisa Bertino,
Fellow, IEEE, and Sanjay Jha, Senior Member, IEEE, “Secure Data Aggregation
Technique for Wireless Sensor Networks in the Presence of Collusion Attacks”,
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,
VOL. 12, NO. 1, JANUARY/FEBRUARY 2015.
Ad

Recommended

Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
IJERA Editor
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
50120140505014
50120140505014
IAEME Publication
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
iPGCON14_134
iPGCON14_134
Prafull Maktedar
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
F33022028
F33022028
IJERA Editor
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
IJMER
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
pijans
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Walchand college of Engineering,Sangli
 
Wsn1 ppt
Wsn1 ppt
NamrathaGrandhi
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
 
A0320105
A0320105
iosrjournals
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
ijtsrd
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
IJECEIAES
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
Association of Scientists, Developers and Faculties
 

More Related Content

What's hot (18)

Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
iPGCON14_134
iPGCON14_134
Prafull Maktedar
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
F33022028
F33022028
IJERA Editor
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
IJMER
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
pijans
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Walchand college of Engineering,Sangli
 
Wsn1 ppt
Wsn1 ppt
NamrathaGrandhi
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
 
A0320105
A0320105
iosrjournals
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
ijtsrd
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
IJMER
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
pijans
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Walchand college of Engineering,Sangli
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
ijtsrd
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 

Similar to Secure data aggregation technique for wireless (20)

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
IJECEIAES
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
Association of Scientists, Developers and Faculties
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET Journal
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 
59
59
ieeeprojectsvadapalani
 
8 ijcse-01235
8 ijcse-01235
Shivlal Mewada
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
Editor IJCATR
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
IRJET Journal
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Dharmendrasingh417
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
22
22
Technology_solution
 
22
22
IMPULSE_TECHNOLOGY
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
IOSR Journals
 
F0361026033
F0361026033
ijceronline
 
Presentation on sensor network
Presentation on sensor network
sarathanjabam
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Net...
IJECEIAES
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET Journal
 
Secure authentication and data aggregation scheme for routing packets in wire...
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
Editor IJCATR
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
IRJET Journal
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Dharmendrasingh417
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
IOSR Journals
 
Presentation on sensor network
Presentation on sensor network
sarathanjabam
 
Ad

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicate
jpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facial
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
jpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsct
jpstudcorner
 
Image super resolution based on
Image super resolution based on
jpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced reference
jpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
jpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motion
jpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images for
jpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correction
jpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metric
jpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind image
jpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertain
jpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllable
jpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
 
Page a partition aware engine
Page a partition aware engine
jpstudcorner
 
Variable length signature for near-duplicate
Variable length signature for near-duplicate
jpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facial
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
jpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsct
jpstudcorner
 
Image super resolution based on
Image super resolution based on
jpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced reference
jpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
jpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motion
jpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images for
jpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correction
jpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metric
jpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind image
jpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertain
jpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllable
jpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
 
Page a partition aware engine
Page a partition aware engine
jpstudcorner
 
Ad

Recently uploaded (20)

Cadastral Maps
Cadastral Maps
Google
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
Cadastral Maps
Cadastral Maps
Google
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 

Secure data aggregation technique for wireless

  • 1. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks ABSTRACT: Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance of very low power processors dramatically improves, future aggregator nodes will be capable of performing more sophisticated data aggregation algorithms, thus making WSN less vulnerable. Iterative filtering algorithms hold great promise for such a purpose. Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources, usually in a form of corresponding weight factors assigned to data provided by each source. In this paper we demonstrate that several existing iterative filtering algorithms, while significantly more robust against collusion attacks than the simple averaging methods, are nevertheless susceptive to a novel sophisticated collusion attack we introduce. To address this security issue, we propose an improvement for iterative filtering techniques by providing an
  • 2. initial approximation for such algorithms which makes them not only collusion robust, but also more accurate and faster converging. EXISTING SYSTEM:  In recent years, there has been an increasing amount of literature on IF algorithms for trust and reputation systems. The performance of IF algorithms in the presence of different types of faults and simple false data injection attacks has been studied where it was applied to compressive sensing data in WSNs.  In the past literature it was found that these algorithms exhibit better robustness compared to the simple averaging techniques; however, the past research did not take into account more sophisticated collusion attack scenarios. If the attackers have a high level of knowledge about the aggregation algorithm and its parameters, they can conduct sophisticated attacks on WSNs by exploiting false data injection through a number of compromised nodes.
  • 3. DISADVANTAGES OF EXISTING SYSTEM:  Although the existing IF algorithms consider simple cheating behaviour by adversaries, none of them take into account sophisticated malicious scenarios such as collusion attacks.  Although the existing IF algorithms consider simple cheating behaviour by adversaries, none of them take into account sophisticated malicious scenarios such as collusion attacks. PROPOSED SYSTEM:  This paper presents a new sophisticated collusion attack scenario against a number of existing IF algorithms based on the false data injection. In such an attack scenario, colluders attempt to skew the aggregate value by forcing such IF algorithms to converge to skewed values provided by one of the attackers.  In this paper, we propose a solution for vulnerability by providing an initial trust estimate which is based on a robust estimation of errors of individual sensors.  Identification of a new sophisticated collusion attack against IF based reputation systems which reveals a severe vulnerability of IF algorithms.  A novel method for estimation of sensors’ errors which is effective in a wide range of sensor faults and not susceptible to the described attack.
  • 4.  Design of an efficient and robust aggregation method inspired by the MLE, which utilises an estimate of the noise parameters obtained using contribution above.  Enhanced IF schemes able to protect against sophisticated collusion attacks by providing an initial estimate of trustworthiness of sensors using inputs from contributions ADVANTAGES OF PROPOSED SYSTEM:  We provide a thorough empirical evaluation of effectiveness and efficiency of our proposed aggregation method. The results show that our method provides both higher accuracy and better collusion resistance than the existing methods.  To the best of our knowledge, no existing work addresses on false data injection for a number of simple attack scenarios, in the case of a collusion attack by compromised nodes in a manner which employs high level knowledge about data aggregation algorithm used.
  • 6. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)
  • 7. REFERENCE: Mohsen Rezvani, Student Member, IEEE, Aleksandar Ignjatovic, Elisa Bertino, Fellow, IEEE, and Sanjay Jha, Senior Member, IEEE, “Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 1, JANUARY/FEBRUARY 2015.