Certain Investigation on Secured Data Transmission in Wireless Sensor Networks

Certain Investigation on Secured Data Transmission in Wireless Sensor Networks

P. Padmaja (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India) and G.V. Marutheswar (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India)
DOI: 10.4018/978-1-7998-2454-1.ch066

Abstract

Wireless Sensor Network (WSN) need to be more secure while transmitting data as well as should be deployed properly to reduce redundancy and energy consumption. WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, a survey of security issues in WSNs is presented and a new algorithm TESDA is proposed, which is an optimized energy efficient secured data aggregation technic. The cluster head is rotated based on residual energy after each round of aggregation so that network lifetime increases. Based on deviation factor calculated, the trust weight is assigned, if more deviation, then the trust value is less. Simulation results observed by using NS-2. From network animator and x-graphs the result are analyzed. Among all protocols tesda is an energy efficient secured data aggregation method.
Chapter Preview
Top

Literature Survey

The rapid development of data aggregation models increase the security concerns in WSN due to the WSN characteristics of unreliable communication medium and resource constrained nodes. A lot of work has been proposed to ensure security in the data aggregation process (Kumar et al., 2013; Mlaih et al., 2008; Poolsappasit et al., 2012). The conventional security mechanisms are categorized into a credential aware data aggregation and trust-aware data aggregation.

Credential Aware Data Aggregation

The credential aware data aggregation models exploit cryptographic keys, certificates, and hashing functions to attain secure communication in WSN. In key based mechanisms, two nodes that want to establish communication must derive a secure key between them to exchange the data in a secured manner (Winkler et al., 2012). The general idea behind credential aware data aggregation model is to process, relocate, and distribute keys and certificates. Although the credential aware data aggregation models ensure confidentiality and integrity of data, they are vulnerable to snooping and compromised attacks. In addition, the aware credential mechanisms introduce high cost and computational complexity in data aggregation. Therefore, credential aware, secure aggregation methods are not adequate to determine the malicious/selfish nodes and to disparate the corresponding nodes among many benign nodes for secure message routing from sensor nodes to sink. Besides, the resource-limited sensor nodes and necessity of decryption at aggregator node pose significant challenges, when implementing secure data aggregation models in WSN.

Complete Chapter List

Search this Book:
Reset