Article

An Efficient Data Aggregation Technique for Green Communication in WSN

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Wireless Sensor Networks (WSNs) progressively participate in many applications. Green communication is the actual application of selecting the energy-efficient method for exchanging the information, networking technologies, and services, minimizing resources used whenever possible in all communications present in WSN. The major issues in WSN are the communication overhead and energy efficiency of each individual sensor node. It should be made to ensure that the valid data is being shared to avoid any remarkable degradation in system function because of faulty or inexact information. It will create confidentiality, a more secured network in which all devices are recognized and no data drawn from an unknown device. To have a protected WSN that is able to withstand malicious trust attacks, contribute an efficient data aggregation technique (EDAT) to enhance the packet delivery ratio in the network while reducing the time to segregate any malicious behavior focusing the trust in the entire network. The detailed evaluation acquired from the theoretical interpretation and the experimental simulations exhibit that the technique can bring down the communication overhead, energy consumption of the network and protect the information from reaching a compromise when compared with the existing schemes.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... As a result, data aggregation helps to decrease circulation and wealth. For example, sensors are transmitted onto the access point in an old forest to provide their felt temperatures for viewing flames [13][14][15]. In this case, the base station might need to send notifications based on its best estimate of all the identifying data. ...
... Anita et al. [13] hypothesized the EDAT technique, the Clusters have a CH depending on their power in the network, and the Q-LEACH protocol selects CH. The whole network categorizes into different groups called "clusters." ...
Preprint
Full-text available
The two biggest problems with wireless sensor networks are security and energy usage. In sensing devices, malicious nodes could be found in large numbers. The researchers have proposed several methods to find these rogue nodes. To prevent assaults on these networks and data transmission, the data must be secured. Data aggregation aids in reducing the number of messages transmitted within the network, which in turn lowers total network energy consumption. Additionally, when decrypting the aggregated data, the base station can distinguish between encrypted and consolidated analysis based on top of the cryptographic keys. By examining the effectiveness of the data aggregation in this research. To solve the above problem, the system provides a method in which an efficient cluster agent is preferred pedestal on its location at the access point and energy availability. The sensor network's energy consumption is reduced by selecting an effective cluster agent, extending the network's lifespan. The cluster's agent is in indict of compiling data for each member node. The clustering agent validates the data and tosses any errors before aggregation. The clustering agent only aggregates confirmed data. To provide end-to-end anonymity, ElGamal elliptic curve (ECE) encryption is used to secure the client data and reassign the encrypted information en route for the cluster agent. Only the base station (BS) can decrypt the data. Furthermore, an ID-based signature system is utilized to enable authenticity. This research presents a technique for recuperating lost data. The access point employs a cache-based backup system to search for lost data.
... As a result, data aggregation helps to decrease circulation and wealth. For example, sensors are transmitted onto the access point in an old forest to provide their felt temperatures for viewing flames [13][14][15]. In this case, the base station might need to send notifications based on its best estimate of all the identifying data. ...
... Anita et al. [13] hypothesized the EDAT technique, the Clusters have a CH depending on their power in the network, and the Q-LEACH protocol selects CH. The whole network categorizes into different groups called "clusters." ...
... In Wireless Internet of Things Sensor Networks, ensuring security, prolonging network lifespan, and reducing energy consumption are essential design requirements. However, sensitive data collected by SNs, such as military communications, are vulnerable to tampering by adversaries, posing threats to network integrity and privacy [5][6] [7]. Addressing these challenges requires a routing protocol that prioritizes both security and efficiency, aiming to enhance network performance, strengthen security measures, and improve overall quality of service across the WITSN [8] [9]. ...
Article
Full-text available
Wireless Internet of Things (IoT) sensor networks (WITSN) play a pivotal role in modern society, facilitating a myriad of applications ranging from smart homes to industrial automation. Therefore, safeguarding these networks against security threats is paramount to ensure the integrity, confidentiality, and availability of data transmitted within them. However, WITSNs face escalating security threats due to their diverse structures and platforms. Existing literature has identified these vulnerabilities but lacks comprehensive solutions to address them effectively. To bridge this gap, this paper proposes a novel security approach termed Randomized Bi-Phase Authentication Scheme (RBAS), which integrates digital watermarking techniques to fortify both external and internal network security. RBAS not only tackles data availability, confidentiality, and authenticity challenges prevalent in WITSNs but also strives to maintain a delicate equilibrium between robust security measures and energy efficiency. Key contributions of this work include the meticulous examination and validation of the integration of cyclic redundancy check (CRC) codes in IoT sensor network authentication, demonstrating their efficacy in error detection through simulations. Furthermore, RBAS employs advanced hashing, cryptography, and dynamic verification codes to ensure strong error detection and data authenticity, leveraging robust CRC codes and randomization to thwart potential attacks. The scheme's complexity acts as a deterrent against manipulation, while its cluster awareness enhances adaptability, and cryptographic principles bolster overall security. Extensive performance evaluation using the Network Simulator-2 (NS2) reveals significant benefits of RBAS, including an 8% reduction in power consumption and a 7% increase in network longevity. Notably, RBAS surpasses existing solutions with a 14% reduction in dropping ratio and an 8% decrease in latency. The success of RBAS stems from its innovative utilization of lightweight watermarking techniques and cluster-based routing, enabling proactive identification of data tampering and thereby enhancing the network's overall security posture. This pioneering work not only advances the state of the art in WITSN security but also holds profound implications for the practical deployment of secure and efficient IoT sensor networks in real-world scenarios.
... A randomized watermarking filtering scheme (RWFS) which provides route filtering through watermarking and homomorphic encryption [30]. The watermark embedding is based on a pseudorandom number generator. ...
Article
Full-text available
Recently, researchers and practitioners in wireless sensor networks (WSNs) are focusing on energy-oriented communication and computing considering next-generation smaller and tiny wireless devices. The tiny sensor-enabled devices will be used for the purpose of sensing, computing, and wireless communication. The hundreds/thousands of WSNs sensors are used to monitor specific activities and report events via wireless communication. The tiny sensor-enabled devices are powered by smaller batteries to work independently in distributed environments resulting in limited maximum lifetime of the network constituted by these devices. Considering the non-uniform distribution of sensor-enabled devices in the next-generation mobility centric WSNs environments, energy consumption is imbalanced among the different sensors in the overall network environments. Toward this end, in this paper, a cluster-oriented routing protocol termed as prediction-oriented distributed clustering (PODC) mechanism is proposed for WSNs focusing on non-uniform sensor distribution in the network. A network model is presented, while categorizing PODC mechanism in two activities including setting cluster of nodes and the activity in the steady state. Further cluster set up activity is described while categorizing in four subcategories. The proposed protocol is compared with individual sensor energy awareness and distributed networking mode of clustering (EADC) and scheduled sensor activity-based individual sensor energy awareness and distributed networking mode of clustering (SA-ADC). The metrics including the overall lifetime of the network and nodes individual energy consumption in realistic next-generation WSNs environments are considered in the experimental evaluation. The results attest the reduced energy consumption centric benefits of the proposed framework PODC as compared to the literature. Therefore, the framework will be more applicable for the smart product development in the next-generation WSNs environments.
Article
Full-text available
Mobile Ad hoc Networks is enormously used owingto its mobility in addition to flexibility in awidespread range of applications. Since, the mobilead hoc network is an autonomous system which isgenerated by mobile nodes without anyinfrastructure support. The cooperative and dynamicnature of the MANET affects the data transmissionthrough the network. Therefore, the secure routingprotocol is required to develop for protecting therouting and application data. In this paper, aneighbor node discovery is developed for identifyingthe black hole nodes in the MANET. Additionally, themulti detection routing protocol is used to generatethe routing path through the network. The keyobjective of this research is to generate the routingpath without any interruption of black hole nodes.The performance of the proposed technique isanalyzed in terms of energy consumption, lifetime,packet delivery ratio, throughput and end to enddelay. Additionally, the proposed method isestimated with the existing method namely EIMO–ESOLSR. The energy consumption of the proposedtechnique is 115J for 10 misbehaving nodes which isless than the EIMO-ESOLSRKeywords: Black hole node, mobile ad hoc network,multi detection routing protocol, neighbor nodediscovery and secure routing protocol. (PDF) A Secure Routing Protocol for MANET using Neighbor Node Discovery and Multi Detection Routing Protocol. Available from: https://www.researchgate.net/publication/345204350_A_Secure_Routing_Protocol_for_MANET_using_Neighbor_Node_Discovery_and_Multi_Detection_Routing_Protocol [accessed May 28 2022].
Article
Full-text available
Wireless Body Area Network is an emerging technology that is used primarily in the area of healthcare applications. It is a low-cost network having the capability of transportability and adaptability. It can be used in location independent and long-term remote monitoring of people without disturbing their daily activities. In a typical WBAN system, sensing devices are either implanted or etched into the human body that continuously monitors his physiological parameters or vital signs. In such a network, trusts among the stakeholders (healthcare providers, users, and medical staff, etc.) are found of high importance and regarded as the critical success factor for the reliability of information exchange among them. In remote patient monitoring, the implementation of trust and privacy preservation is crucial, as vital parameters are being communicated to remote locations. Nonetheless, its widespread use, WBAN, has severe trust and privacy risks, limiting its adaptation in healthcare applications. To address trust and privacy-related issues, reliable communication solutions are widely used in WBANs. Given the motivation, in this paper, we have proposed a trust-based communication scheme to ensure the reliability and privacy of WBAN. To ensure reliability, a cooperative communication approach is used, while for privacy preservation, a cryptography mechanism is used. The performance of the proposed scheme is evaluated using MATLAB simulator. The output results demonstrated that the proposed scheme increases service delivery ratio, reliability, and trust with reduced average delay. Furthermore, a fuzzy-logic method used for ranking benchmark schemes, that has been concluded that the proposed scheme has on top using comparative performance ranking.
Article
Full-text available
The Internet of Things (IoT), including wireless sensors, is one of the highly anticipated contributors to big data; therefore, avoiding misleading or forged data gathering in cases of sensitive and critical data through secure communication is vital. Wireless sensor networks are relatively simple, scalable networks with many applications in research. They can provide many benefits, including ad hoc distribution, lower costs, and higher flexibility. In a scenario where time is of the essence and dedicated base stations cannot be established, mobile sinks must be used to gather data. IoT systems are based on a collective organization in which devices collaborate to provide better and more accurate decisions. It is important to ensure that the information being shared is legitimate to avoid any significant degradation in system performance because of false or inaccurate information. Building trust—the “assurance” between two devices that the information being shared can be used with confidence that it is accurate—will create a trustworthy, secure system in which all devices are identified and no information is accepted from any unauthorized device. The key contribution of this work is a new, dynamic, trust-based clustering mechanism by which nodes can securely connect to one another and begin transmitting data to a sink while it is available. To demonstrate the utility of this mechanism, we examine two possible attacks on a trust-based network and present a heuristic solution for minimizing the negative effects of such attacks in an energy-efficient way. Our results show improved network performance through reduction of the number of cycles required to isolate or mitigate the effect of malicious nodes in the network, thus reducing the energy consumption in the network with a concomitant increase in its lifespan. Our cluster methodology also has the effect of spreading energy consumption among nodes, thereby reducing early fall-off of nodes and network holes.
Article
Full-text available
Abstract Wireless sensor networks (WSNs) have become one of the most vigorous techniques in the network domain. However, the sensor nodes of WSNs tend to become the target of attackers due to the broadcast communication mode and the unattended deployment nature. Although it can prevent the sensitive data from being compromised, Slice-Mix-AggRegaTe (SMART) needs to exchange messages frequently in a network, which put tremendous overhead on the sensor nodes with limited resources. Faced with these issues, this paper proposes an energy-efficient privacy-preserving data aggregation protocol based on slicing (EPPA) where a novel slicing mode is adopted to reduce the numbers of slices, which can significantly prevent the data from being compromised and decrease the communication overhead. Meanwhile, an enhanced scheme based on EPPA, called multi-function privacy-preserving data aggregation protocol (MPPA), is presented and it supports multiple functions in the process of data aggregation, such as max/min, count, and mean. The theoretical analysis and the simulation evaluation show that the proposed aggregation protocols demonstrate a better performance in the privacy preserving and the communication efficiency.
Article
Full-text available
Wireless sensor networks (WSN) consist of diverse and minute sensor nodes which are widely employed in different applications, for example, atmosphere monitoring, search and rescue activities, disaster management, untamed life checking and so on. A WSN which is an accumulation of clusters and information exchange occurs with the assistance of cluster head (CH). A lot of sensor nodes' energy is utilized in procedures like detection, information exchange and making clusters using various protocols. In a cluster based WSN, it is profitable to segregate the tasks performed by cluster heads as a fair amount of energy could be conserved. Following this, we propose a solution to include a supplementary node that is named as a 'super node' alongside cluster head in a cluster based WSN in this work. This node is in-charge of all the clusters in a WSN and takes care of the entire cluster's energy information. It manages the cluster heads from their creation to the end. All the clusters in the network send their respective information to this node that eliminates redundant information and forwards the aggregated information towards the sink. This not only saves the CH energy but also conserves individual cluster node's energy by proper monitoring the energy levels. This mechanism enhances the lifetime of the network by minimizing the number of communications between nodes and the sink. In order to evaluate the performance of our proposed mechanism, we use various parameters like packet delay, communication overhead and energy consumption that show the optimality of our approach.
Article
Full-text available
In large-scale wireless sensor networks (WSNs), nodes close to sink nodes consume energy more quickly than other nodes due to packet forwarding. A mobile sink is a good solution to this issue, although it causes two new problems to nodes: (i) overhead of updating routing information; and (ii) increased operating time due to aperiodic query. To solve these problems, this paper proposes an energy-efficient data collection method, Sink-based Centralized transmission Scheduling (SC-Sched), by integrating asymmetric communication and wake-up radio. Specifically, each node is equipped with a low-power wake-up receiver. The sink node determines transmission scheduling, and transmits a wake-up message using a large transmission power, directly activating a pair of nodes simultaneously which will communicate with a normal transmission power. This paper further investigates how to deal with frame loss caused by fading and how to mitigate the impact of the wake-up latency of communication modules. Simulation evaluations confirm that using multiple channels effectively reduces data collection time and SC-Sched works well with a mobile sink. Compared with the conventional duty-cycling method, SC-Sched greatly reduces total energy consumption and improves the network lifetime by 7.47 times in a WSN with 4 data collection points and 300 sensor nodes.
Article
Full-text available
Privacy problems are lethal and getting more attention than any other issue with the notion of the Internet of Things (IoT). Since IoT has many application areas including smart home, smart grids, smart healthcare system, smart and intelligent transportation and many more. Most of these applications are fueled by the resource-constrained sensor network, such as Smart healthcare system is powered by Wireless Body Area Network (WBAN) and Smart home and weather monitoring systems are fueled by Wireless Sensor Networks (WSN). In the mentioned application areas sensor node life is a very important aspect of these technologies as it explicitly effects the network life and performance. Data aggregation techniques are used to increase sensor node life by decreasing communication overhead. However, when the data is aggregated at intermediate nodes to reduce communication overhead, data privacy problems becomes more vulnerable. Different Privacy-Preserving Data Aggregation (PPDA) techniques have been proposed to ensure data privacy during data aggregation in resource-constrained sensor nodes. We provide a review and comparative analysis of the state of the art PPDA techniques in this paper. The comparative analysis is based on Computation Cost, Communication overhead, Privacy Level, resistance against malicious aggregator, sensor node life and energy consumption by the sensor node. We have studied the most recent techniques and provide in-depth analysis of the minute steps involved in these techniques. To the best of our knowledge, this survey is the most recent and comprehensive study of PPDA techniques.
Article
Full-text available
The WSN is currently in demand due to is bright application in both of the field of military and civil. However, for the wireless sensor network has limited energy and routing protocols are not suitable for traditional network. Data aggregation is an approach which supports lifetime of the wireless sensor networks (WSNs) against the limited energy. The proposed methodology deals with MAC authentication scheme for secure data aggregation that helps to achieve efficient secure data integrity and privacy with the improvement of energy efficiency and security. To avoid data loss in WSN, network is separated in different clusters, each cluster is headed by an aggregator (Cluster Head) and directly connected to sink through other CH. The methodology uses an algorithm for finding the cluster head on the basis of threshold value. The protocol uses a Homomorphic Encryption with secure hash Function algorithm for encryption and for calculating the hash value to maintain the integrity.
Article
Full-text available
Basic security of data transmission in battery-powered wireless sensor networks (WSNs) is typically achieved by symmetric-key encryption, which uses little energy; but solar-powered WSNs sometimes have sufficient energy to achieve a higher level of security through public-key encryption. However, if energy input and usage are not balanced, nodes may black out. By switching between symmetric-key and public-key encryption, based on an energy threshold, the level of security can be traded off against the urgency of energy-saving. This policy can also reduce the amount of energy used by some nodes in a WSN, since data encrypted using a public-key is simply relayed by intermediate nodes, whereas data encrypted using a symmetric-key must be decrypted and reencrypted in every node on its path. Through a simulation, we compared the use of either symmetric-key or public-key encryption alone with our scheme, which was shown to be more secure, to use energy more effectively, and to reduce the occurrence of node blackouts.
Article
Full-text available
The data aggregation is a widely used mechanism in Wireless Sensor Networks (WSNs) to increase lifetimeof a sensor node, send robust information by avoiding redundant data transmission to the base station. The privacy preserving data aggregation is a challenge in wireless communication medium as it could be eavesdropped; however it enhances the security without compromising energy efficiency. Thus the privacy protecting data aggregation protocols aims to prevent the disclosure of individual data though an adversary intercept a link or compromise a node's data. We present a study of different privacy preserving data aggregation techniques used in WSNs to enhance energy and security based on the types of nodes in the network, topology and encryptions used for data aggregation.
Article
Full-text available
Recent trends in wireless sensor networks leads to the development of new protocols for data gathering where security and energy are the important considerations. Energy efficient approaches are an effective way to prolong the lifetime of the network. In this paper, a secure energy efficient location aware data gathering (SELADG) approach is introduced tothe secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) algorithm is utilized for key generation and key exchange among the sensor nodes to maintain security and prevent the data from malicious nodes. Based upon the energy and the location of the nodes, the routes are formulated. The node which is having the highest residual energy and the nearest neighbor nodes are used to forward the data packets to the destination. The proposed system performance is validated in terms of packet drop, throughput, energy consumption, residual energy and network lifetime. This scheme is compared with the existing data gathering scheme. The proposed scheme results better outcomes than the existing approach.
Article
Full-text available
This paper endeavors to investigate the security and energy issues in wireless sensor networks from prior art such as game theory and various embodiments of methods like public-key cryptography. Due to the needs of interacting with the physical world, thanks to a plethora of innovative applications, the state of the art in wireless sensor networks (WSNs) is focusing on multiple purposes such as monitoring, tracking, and security while relying upon some assumptions about distributed data, whereas these assumptions may not hold in a real scenario. The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. The study considers the ZigBee known as IEEE 802.15.4 standard for its high trustworthiness and low power consumption in wireless sensor network and compares different topology models.
Article
Full-text available
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route aggregation. However, the use of inherently malleable privacy homomorphism makes these protocols vulnerable to active attackers. In this paper, we propose an integrity and privacy preserving end-to-end secure data aggregation protocol. We use symmetric key-based homomorphic primitives to provide end-to-end privacy and end-to-end integrity of reverse multicast traffic. As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network's lifetime. We comparatively evaluate the performance of the proposed protocol to show its efficacy and efficiency in resource-constrained environments.
Article
The security of Wireless Sensor Network (WSN) in its applications face great challenges while satisfying energy constraints in green computing. WSN have different kinds of constraints such as lack of infrastructure, limited memory, low computation capability and reduced battery life, by those, security implied as supplemental demanding job. Since, there is much difference in reading values of sensor node and failure in nodes; it is difficult for accurate data extraction and aggregation in WSN. The principal purpose of data aggregation (DA) is to collect data in an energy efficient manner by which the network existence will be increased. This model investigates security linked issues, challenges and requirements in WSN. And also, a trust based framework for predicting the effectiveness of secured DA in WSN is presented. In this technique, a Trust rating function is developed to find the trust rating value of each sensor nodes and then form data aggregation tree (DAT) based on modified Cuckoo search algorithm (CSA). The sensor nodes with higher trust rating are selected as aggregators. Each sensor node encrypts data using watermarking techniques. Encrypted data is aggregated and transmitted to sink by aggregator. The simulation outcome depict that the intended model have superior than the existing one.
Article
In Wireless Sensor Networks, during data fragmentation, there are chances for dropping some blocks and injecting forged data by the attackers. So the integrity of these fragmented blocks and correctness of data, need to be verified. Also, DoS attacks needs to be prevented. In order to consider the above points, we proposed a design trust based data aggregation protocol using data validation and integrity verification in WSN. In this protocol, aggregation tree is formed by using the trust value which is evaluated for each node based on the trust features and the sensed data is encrypted with the shared symmetric key. Then the encrypted data are fragmented and signed with homomorphic MAC tag. Once the signed blocks are received, the aggregator performs SUM aggregation function after checking the correctness of data and verifying integrity of each block. The aggregated result is then transmitted to the sink, where it is again verified by the sink. This process is repeated by each sensor for the sensed results. By comparing the values obtained by simulation, we exhibit that the presented technique improves the data correctness.
Article
Green communication in wireless sensor networks (WSNs) has witnessed significant attention due to the growing significance of sensor enabled smart environments. Energy optimization and communication optimization are two major themes of investigation for green communication. Due to the growing sensor density in smart environment, intelligently finding shortest path for green communication has been proven an NP-complete problem. Literature in green communication majorly focuses towards finding centralized optimal path solution. These centralized optimal-path finding solutions were suitable for application specific traditional WSNs environments. The cutting edge sensor enabled smart environments supporting heterogender applications require distributed optimal path finding solutions for green communication. In this context, this paper proposes a genetic algorithm enabled distributed zone approach for green communication. Specifically, instead of searching the optimal path solution in the whole network, the proposed algorithm identifies path in a small search space called distributed forward zone. The concept of forward zone enhances the searching convergence speed and reduces the computation centric communication cost. To encode the distributed routing solutions, variable length chromosomes are considered focusing on the target distributed area. The genetic algorithm enabled distributed zone approach prevents all the possibilities of forming the infeasible chromosomes. Crossover and truncation selection together generate a distributed path finding solution. To validate the experimental results with analytical results, various mathematical models for connectivity probability, expected end-to-end delay, expected energy consumption, and expected computational cost have been derived. The simulation results show that the proposed approach gives the high-quality solutions in comparison to the state-of-the-art techniques including Dijkstra's algorithm, compass routing, most forward within radius, Ahn-Ramakrishna's algorithm and reliable routing with distributed learning automaton (RRDLA).
Article
The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two severe types of attacks: sinkhole and Sybil attacks that are difficult to detect by existing cryptographic approaches. The proposed SDAACA protocol consists of two novel algorithms: the secure data fragmentation (SDF) and the node joining authorization (NJA). The SDF algorithm hides the data from the adversary by fragmenting it into small pieces. In the NJA algorithm, an authorization process is initiated before allowing any new node to join the network. Both algorithms help improve the Quality of Service (QoS) parameters. Moreover, we propose an access control scheme that supports accuracy, energy efficiency, freshness and authentication by reducing the communication overhead and guaranteeing the communication authenticity process. Furthermore, the proposed protocol is mapped on the oil-refinery plant to prevent and detect both sinkhole and Sybil attacks in presence of static and mobile sensor nodes. Finally, we show the effectiveness of our proposed protocol through extensive simulations and a comparative study of other known secure data aggregation protocols.
Article
We consider the problem of secure detection in wireless sensor networks operating over insecure links. It is assumed that an eavesdropping fusion center (EFC) attempts to intercept the transmissions of the sensors and to detect the state of nature. The sensor nodes quantize their observations using a multilevel quantizer. Before transmission to the ally fusion center (AFC), the senor nodes encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor's data to another quantizer output level using a stochastic cipher matrix (key). The communication between the sensors and each fusion center is assumed to be over a parallel access channel with identical and independent branches, and with each branch being a discrete memoryless channel. We employ J-divergence as the performance criterion for both the AFC and EFC. The optimal solution for the cipher matrices is obtained in order to maximize J-divergence for AFC, whereas ensuring that it is zero for the EFC. With the proposed method, as long as the EFC is not aware of the specific cipher matrix employed by each sensor, its detection performance will be very poor. The cost of this method is a small degradation in the detection performance of the AFC. The proposed scheme has no communication overhead and minimal processing requirements making it suitable for sensors with limited resources. Numerical results showing the detection performance of the AFC and EFC verify the efficacy of the proposed method.
Review on Packet drop prevention in MANET by counter-based digester ACK
Dr. Mohammed Ali Hussain, Dr. Balaganesh Duraisamy., Review on Packet drop prevention in MANET by counter-based digester ACK, International Journal of Engineering Trends and Technology 68(8) (2020) 102-107.