SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1400
Review for Secure Data Aggregation In Wireless Sensor Networks
Shweta Rana, Prof. Arundhati Dudhgoankar
1Department of MCA , Jawaharlal Nehru Engineering college
2Professor, Department of MCA & Jawaharlal Nehru Engineering college, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Now a day data aggregation is widely used
technique in WSN. Security is important issue in data
aggregation. In many application ,the data collected from
particular node is aggregate at a base station. Data
aggregation is a technique to process and analysis the
collected data fromsurroundingenvironment. Inthispaperwe
express or represent achieving security in wsn for data
aggregation using Hop-by-Hop and End-to-End data
aggregation encryption model research have focus on
avoiding forgery using above techniques.
Key Words: Wireless Sensor Network, Data Aggregation,
Security Requirement.
1. INTRODUCTION
Wireless sensor network can be define infrastructure less
wireless network to observe surrounding environmental
condition such as temperature, motion, vibration,sound etc.
In wsn have been successfully applied in various application
domain like military application, area monitoring, health
application, environmental sensing etc. The sensor have
rigid component in term of storage, cpu, battery power,
network bandwidth. Data aggregation is a technique to
remove unnecessary transmission from collected data and
provide information to base station. The main function of
data aggregation subdue the redundancy, so that lifetime
network is improve. Usually, two method can be used for
secure data aggregationin wsn:Hop-by-HopandEnd-to-End
encrypted data aggregation. In Hop-by-Hop sensing node
generate data encrypt it and send it to the aggregator, this
encrypt data decrypted at the aggregator encrypted back
after aggregation. This is repeated at every node. In End-to-
End the sensing node encrypt the data but only base station
has to decrypt. Data encryption and decryption done only at
the end[6].
2. DATA AGGREGATION IN WSN
Data aggregation is an efficient way to minimize energy
consumption. On sensor data aggregation is defined as the
process of aggregation of data from the multiple sensor to
eliminate unnecessary or redundant transmission and
provide combined information to the base station. Base
station send queries to the network instead of sending each
sensor node data to the base station, one of the sensor node
data aggregator. It collects the information from its
neighboring nodes,aggregatethemandsendthe basestation
over a multi hop path. The data collected from sensor needs
to be processed in order to extract meaningful information
from it may time this processing is done by means of
aggregation function like SUM, AVERAGE, MEAN, MEDIAN,
etc. Data aggregation in sensor network portion to the
processing of sensor data, with in the network in a
distributed manner. In fig[1] if each sensor has to send its
reading back to the base station, withoutaggregationeach of
the leaf node sensor generates a reading of sends it to its
parent.
fig.[1] data aggregation in wsn
In network data aggregation also enable the network to
directly. Provide service rather than raw data, when we
enable the nodes to do computation and processing of data
rather than just sensing and forwarding message, sensor
process processed information instead of just raw data.
3. SECURITY REQUIREMENT OF DATA
AGGREGATION
Data aggregation is an efficient way to minimize energy
consumption on sensor but it also create new security
challenges. Security is the important issuein wsnitis related
with data aggregation process[3][8].
I)Data Confidentiality:
Data confidentiality is a fundamental issue in everyaspect of
security. Confidentiality is equivalent to privacy. The data
confidentiality is protecting the data from unauthorized
access. It can be divided into Hop-by-Hop basis and End-to-
End basis.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1401
fig.[2] wireless sensor network security issue
II)Data Integrity:
Data integrity assured that a message being transferred is
never computed. Data integrity deals with insuring that the
received data has not been tempered with in the path
between in receiver and sender. Integrity engage maintain
the truth and honesty of data in the entire network.
III)Data Authentication:
Data authentication permits a sensor node to ensure the
identity of the peer node. Data authenticationguaranteethat
the reported data is the same as the original one. Senderand
receiver share a secret key to calculate the message
authentication code for all transmitted data.
IV)Data Availability:
Once the attacker gets into the wsn by compromising a
node, the attack will affect especially in those party of the
network where the attack has been launched. Availability
of data aggregation is more important than regular sensor
node.
4. SECURE DATA AGGREGATION PHASE
Data aggregation schemes can be classified into 2 groups
based on the type of encryption is used:
1) Hop-by-Hop
2) End-to-End
1) Hop-by-Hop Encryption:
In Hop-by-Hop encryption[6], the bootstrapping
phase used, the keys are securely distributed to the
sensor these keys are brought into used in the data
aggregation phase. Sensing node generate data
encrypt it and send it to the aggregator, this
encrypted data is decrypted at the aggregator node
and encrypted back after aggregation this is
repeated at every node. The encryption can either
be symmetric or asymmetric key. The parent
decrypts the data using the sharedpair wisekeyand
aggregate all such data received from its children.
This process continuous till the data reaches the
base station which decrypts it in a similar fashion.
2) End-to-End Encryption:
In End-to-End Encryption[6] provide protection
from this, as the data is not decrypted. Anywhere in
the network, but the base station also, since
encryption and decryption operations are
computationally expensive and time consuming.
End-to-End encryption help save resource data
encryption and decryption done only at the end, to
achieve End-to-End security. This can bedoneusing
homomorphism encryption algorithm. In that, the
sensor use public key to encrypt the data andsendit
to their parent. The parent receives the encrypted
data from all its children.
We also provide secure data aggregationbytrustmodel:
 Efficient Distributed Trust Model
fig.[3] EDTM data flow diagram
In wireless sensor network efficient distributed trust model
is used to compute the direct trust and recommendation
trust while calculating the direct trust, the other trust like
communication trust, energy trust, etc are consider.
Recommendation trust is to improve accuracy for sensor
node. The EDTM model[5][7] detects the harmful node
based. EDTM provide more security and increase the packet
delivery ratio. In WSN, EDTM providetrustworthiness for all
the sensor node in the network node used for data
aggregation may not be malevolent node therefore by using
EDTM in wireless sensor network before data aggregation
process can help in avoiding false data aggregation. There
are 3 kinds of node in the network subject node,
recommender and object node. If a sensornodeAtrustvalue
another node B. The evaluating sensornodeAisreference as
WSN SECURITY
wsn
wsn
Data
confidentiality
Data
integrity
Data
authentication
Data
availability
EDTM
Trust worthiness of node
Multi hop network
Directly communication
with neighbour node
Calculate trust values
Based on subject
observation
Recommendation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1402
subject node and the evaluated node B is the object node.
The trust value is calculated from a third party. By using
EDTM in WSN before data aggregationitcanavoidedforgery
data.
5. CONCLUSIONS
In these paper is studied about data aggregation, security
requirement or issues and secure data aggregation phase in
wireless sensor network. In additional it reviewedabout the
efficient distributed trust model (EDTM) for data
aggregation basically important requirement of WSN are
excellent security with high energy efficiency. These paper
have focus on avoiding data forgery or falsification data to
reduces the energy consumption. It avoiding multiple
redundant or unnecessary data transmission data from
multiple sensor using above techniques during aggregation
process.
REFERENCES
1) M. Suraj, B. Raja, T. Vengaltaraman “ Secure Data
Aggregation In Wireless Sensor Network Using
Trust Model” in IJEST April-2016
2) Yingpeng Sang, Hong Shen “Secure Data
Aggregation In WSN: A survey”
3) N. Vidhya, Dr. P. Sengottuvelan “Secure Data
Aggregation Technique In Wireless Sensor
Network” in IJIRCCE Oct-2015
4) Vimal Kamal and Sanjay Madria “Secure Data
Aggregation In Wireless Sensor Network”
5) Nefilda K. Joseph, Jathin Jos “A Secure EDTM For
Wireless Sensor Network” in IJSER FEB-2016
6) Patel Swapnil “Secure data aggregation in Wireless
Sensor Network :A survey ”
7) Dheeraj Vdayaravi Moorti, Shih Yu Chang “An
Efficient Distributed Trust Model For Wireless
Sensor Network” in IJMETMR
8) Hani Alzaid, Ernest Foo, Gunzales Nieto “Secure
Data Aggregation In WSN: A survey ”
9) S. Shashank, R.Precila “An Efficient Distributed
Trust Model for Secure Transmission In Wireless
Sensor Network” in IJETCSE Mar-2016

More Related Content

PDF
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
PDF
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
PDF
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
PDF
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
Secure data aggregation technique for wireless
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage

What's hot (20)

PDF
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
PDF
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
PDF
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
PDF
Review on Intrusion Detection in MANETs
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
An efficient approach for secured communication in wireless sensor networks
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
PDF
Enhanced security for non English users of Wireless Sensor Networks
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
Gf3311081111
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
A0320105
PDF
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
PDF
Firewall and vpn investigation on cloud computing performance
PDF
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
Review on Intrusion Detection in MANETs
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
An efficient approach for secured communication in wireless sensor networks
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Enhanced security for non English users of Wireless Sensor Networks
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Gf3311081111
Lightweight secure scheme for detecting provenance forgery and packet drop at...
A0320105
Privacy Preserving Data Mining Technique to Recover Association Rules Using H...
Secure data dissemination protocol in wireless sensor networks using xor netw...
Firewall and vpn investigation on cloud computing performance
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Ad

Similar to Review for Secure Data Aggregation in Wireless Sensor Networks (20)

PDF
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
PDF
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
PDF
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
PDF
Proximate node aware optimal and secure data aggregation in wireless sensor ...
PDF
Detecting Password brute force attack and Protecting the cloud data with AES ...
PDF
S04404116120
PDF
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
PDF
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
PDF
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
PDF
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
PDF
A Paired Key Mechanism for Wirelesslink Security for WSNS
PDF
710201940
PDF
Ijarcet vol-2-issue-3-901-903
PDF
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
PDF
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
PDF
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
S04404116120
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
Performance Analysis of Wireless Trusted Software Defined Networks
A Paired Key Mechanism for Wirelesslink Security for WSNS
710201940
Ijarcet vol-2-issue-3-901-903
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Digital Logic Computer Design lecture notes
PPT
introduction to datamining and warehousing
PDF
composite construction of structures.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Artificial Intelligence
PPTX
Current and future trends in Computer Vision.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Construction Project Organization Group 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
573137875-Attendance-Management-System-original
Lecture Notes Electrical Wiring System Components
Operating System & Kernel Study Guide-1 - converted.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Digital Logic Computer Design lecture notes
introduction to datamining and warehousing
composite construction of structures.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CH1 Production IntroductoryConcepts.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Artificial Intelligence
Current and future trends in Computer Vision.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Automation-in-Manufacturing-Chapter-Introduction.pdf
Geodesy 1.pptx...............................................
Construction Project Organization Group 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Foundation to blockchain - A guide to Blockchain Tech

Review for Secure Data Aggregation in Wireless Sensor Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1400 Review for Secure Data Aggregation In Wireless Sensor Networks Shweta Rana, Prof. Arundhati Dudhgoankar 1Department of MCA , Jawaharlal Nehru Engineering college 2Professor, Department of MCA & Jawaharlal Nehru Engineering college, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Now a day data aggregation is widely used technique in WSN. Security is important issue in data aggregation. In many application ,the data collected from particular node is aggregate at a base station. Data aggregation is a technique to process and analysis the collected data fromsurroundingenvironment. Inthispaperwe express or represent achieving security in wsn for data aggregation using Hop-by-Hop and End-to-End data aggregation encryption model research have focus on avoiding forgery using above techniques. Key Words: Wireless Sensor Network, Data Aggregation, Security Requirement. 1. INTRODUCTION Wireless sensor network can be define infrastructure less wireless network to observe surrounding environmental condition such as temperature, motion, vibration,sound etc. In wsn have been successfully applied in various application domain like military application, area monitoring, health application, environmental sensing etc. The sensor have rigid component in term of storage, cpu, battery power, network bandwidth. Data aggregation is a technique to remove unnecessary transmission from collected data and provide information to base station. The main function of data aggregation subdue the redundancy, so that lifetime network is improve. Usually, two method can be used for secure data aggregationin wsn:Hop-by-HopandEnd-to-End encrypted data aggregation. In Hop-by-Hop sensing node generate data encrypt it and send it to the aggregator, this encrypt data decrypted at the aggregator encrypted back after aggregation. This is repeated at every node. In End-to- End the sensing node encrypt the data but only base station has to decrypt. Data encryption and decryption done only at the end[6]. 2. DATA AGGREGATION IN WSN Data aggregation is an efficient way to minimize energy consumption. On sensor data aggregation is defined as the process of aggregation of data from the multiple sensor to eliminate unnecessary or redundant transmission and provide combined information to the base station. Base station send queries to the network instead of sending each sensor node data to the base station, one of the sensor node data aggregator. It collects the information from its neighboring nodes,aggregatethemandsendthe basestation over a multi hop path. The data collected from sensor needs to be processed in order to extract meaningful information from it may time this processing is done by means of aggregation function like SUM, AVERAGE, MEAN, MEDIAN, etc. Data aggregation in sensor network portion to the processing of sensor data, with in the network in a distributed manner. In fig[1] if each sensor has to send its reading back to the base station, withoutaggregationeach of the leaf node sensor generates a reading of sends it to its parent. fig.[1] data aggregation in wsn In network data aggregation also enable the network to directly. Provide service rather than raw data, when we enable the nodes to do computation and processing of data rather than just sensing and forwarding message, sensor process processed information instead of just raw data. 3. SECURITY REQUIREMENT OF DATA AGGREGATION Data aggregation is an efficient way to minimize energy consumption on sensor but it also create new security challenges. Security is the important issuein wsnitis related with data aggregation process[3][8]. I)Data Confidentiality: Data confidentiality is a fundamental issue in everyaspect of security. Confidentiality is equivalent to privacy. The data confidentiality is protecting the data from unauthorized access. It can be divided into Hop-by-Hop basis and End-to- End basis.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1401 fig.[2] wireless sensor network security issue II)Data Integrity: Data integrity assured that a message being transferred is never computed. Data integrity deals with insuring that the received data has not been tempered with in the path between in receiver and sender. Integrity engage maintain the truth and honesty of data in the entire network. III)Data Authentication: Data authentication permits a sensor node to ensure the identity of the peer node. Data authenticationguaranteethat the reported data is the same as the original one. Senderand receiver share a secret key to calculate the message authentication code for all transmitted data. IV)Data Availability: Once the attacker gets into the wsn by compromising a node, the attack will affect especially in those party of the network where the attack has been launched. Availability of data aggregation is more important than regular sensor node. 4. SECURE DATA AGGREGATION PHASE Data aggregation schemes can be classified into 2 groups based on the type of encryption is used: 1) Hop-by-Hop 2) End-to-End 1) Hop-by-Hop Encryption: In Hop-by-Hop encryption[6], the bootstrapping phase used, the keys are securely distributed to the sensor these keys are brought into used in the data aggregation phase. Sensing node generate data encrypt it and send it to the aggregator, this encrypted data is decrypted at the aggregator node and encrypted back after aggregation this is repeated at every node. The encryption can either be symmetric or asymmetric key. The parent decrypts the data using the sharedpair wisekeyand aggregate all such data received from its children. This process continuous till the data reaches the base station which decrypts it in a similar fashion. 2) End-to-End Encryption: In End-to-End Encryption[6] provide protection from this, as the data is not decrypted. Anywhere in the network, but the base station also, since encryption and decryption operations are computationally expensive and time consuming. End-to-End encryption help save resource data encryption and decryption done only at the end, to achieve End-to-End security. This can bedoneusing homomorphism encryption algorithm. In that, the sensor use public key to encrypt the data andsendit to their parent. The parent receives the encrypted data from all its children. We also provide secure data aggregationbytrustmodel:  Efficient Distributed Trust Model fig.[3] EDTM data flow diagram In wireless sensor network efficient distributed trust model is used to compute the direct trust and recommendation trust while calculating the direct trust, the other trust like communication trust, energy trust, etc are consider. Recommendation trust is to improve accuracy for sensor node. The EDTM model[5][7] detects the harmful node based. EDTM provide more security and increase the packet delivery ratio. In WSN, EDTM providetrustworthiness for all the sensor node in the network node used for data aggregation may not be malevolent node therefore by using EDTM in wireless sensor network before data aggregation process can help in avoiding false data aggregation. There are 3 kinds of node in the network subject node, recommender and object node. If a sensornodeAtrustvalue another node B. The evaluating sensornodeAisreference as WSN SECURITY wsn wsn Data confidentiality Data integrity Data authentication Data availability EDTM Trust worthiness of node Multi hop network Directly communication with neighbour node Calculate trust values Based on subject observation Recommendation
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1402 subject node and the evaluated node B is the object node. The trust value is calculated from a third party. By using EDTM in WSN before data aggregationitcanavoidedforgery data. 5. CONCLUSIONS In these paper is studied about data aggregation, security requirement or issues and secure data aggregation phase in wireless sensor network. In additional it reviewedabout the efficient distributed trust model (EDTM) for data aggregation basically important requirement of WSN are excellent security with high energy efficiency. These paper have focus on avoiding data forgery or falsification data to reduces the energy consumption. It avoiding multiple redundant or unnecessary data transmission data from multiple sensor using above techniques during aggregation process. REFERENCES 1) M. Suraj, B. Raja, T. Vengaltaraman “ Secure Data Aggregation In Wireless Sensor Network Using Trust Model” in IJEST April-2016 2) Yingpeng Sang, Hong Shen “Secure Data Aggregation In WSN: A survey” 3) N. Vidhya, Dr. P. Sengottuvelan “Secure Data Aggregation Technique In Wireless Sensor Network” in IJIRCCE Oct-2015 4) Vimal Kamal and Sanjay Madria “Secure Data Aggregation In Wireless Sensor Network” 5) Nefilda K. Joseph, Jathin Jos “A Secure EDTM For Wireless Sensor Network” in IJSER FEB-2016 6) Patel Swapnil “Secure data aggregation in Wireless Sensor Network :A survey ” 7) Dheeraj Vdayaravi Moorti, Shih Yu Chang “An Efficient Distributed Trust Model For Wireless Sensor Network” in IJMETMR 8) Hani Alzaid, Ernest Foo, Gunzales Nieto “Secure Data Aggregation In WSN: A survey ” 9) S. Shashank, R.Precila “An Efficient Distributed Trust Model for Secure Transmission In Wireless Sensor Network” in IJETCSE Mar-2016