Data collection is a very important function provided by wireless sensor networks. In the entire, sensor node spread in the critical area in an unplanned manner. Sensor network are collection of sensor node which co-operatively send sensed data to sink node. After sensing the each sensor to deployed densely data to the base station so that a WSN can successfully operate in the presence of component failures or Densely Traffic Collusion Attack. In this environment it’s very difficult to continuously surveillance. Its currently research potential in securing data aggregation in the WSN. So we solved this problem using Cartesian product sets, Inductive Reasoning Implementation and Translating Method. In this Article, we propose New Sequence Key (NSKey) Algorithm to avoid the Densely Traffic Collusion Attack. In particular, we present a Path File List (PFlist) Algorithm which the sink node can determine if the compute aggregate (SRA Value) include any wrong contribution.
Keywords |
Densely Traffic Collusion Attack, New Sequence Key (NSKey) Algorithm, Path File List, Data collection |
INTRODUCTION |
A sensor (also called detector) is a converter that measures a physical quantity and converts it into a signal [1]. The
collection of individual sensor nodes can be connected into a wireless sensor network and the principal tasks are nodecomputation,
storage, communication, and sensing. The components which are required to perform this task can be
roughly categorized into three categories Passive, Omni-directional sensors. These sensors can measure a physical
quantity at the point of the sensor node without actually manipulating the Environment by active probing. |
– In this sense, they are passive [2] [3]. There is no notion of “direction” involved in these measurements. Examples for
such sensors include thermometer, light sensors, vibration, Microphones, humidity, mechanical stress or tension in
materials, chemical sensors sensitive for given substances, smoke detectors, air pressure, and so on. |
– Passive, narrow-beam [2] [3] sensors these sensors are passive as well, but have a well-defined notion of direction of
measurement. A typical example is a camera, which can “take measurements in a given direction, but has to be rotated
if need be. |
– Active sensors this last group of sensors actively probes the environment, for example, a sonar or radar sensor or
some types of seismic sensors. |
Wireless Sensor Networks (WSN) is an challenging technology that has a wide range of potential applications,
including environmental monitoring (e.g., traffic and habitat), industrial sensing and diagnostics (e.g., factory and
supply chains),infrastructure protection (e.g., water distribution), battlefield awareness (e.g., multi-target tracking) and
home computing(e.g., intelligent home)[1]. |
Wireless sensor network use three basic networking topologies - Point to Point (Simply a dedicated link between two
points) - Star (Star network are an aggregation of point to point links with a central node that manages a fixed number
of slave nodes and serves as the conduit for all upstream communication, Master nodes can also link with other master
nodes to extend star network in to various configurations called cluster or cluster tree network) - Mesh (Point to
multipoint, In the mesh topology every node has multiple pathways to every other node, providing resiliency and
flexibility). One drawbacks of a star topology is that the master node is a single point of failure, if a master node fails,
the entire sub network fails [3] [4]. Most practical mesh network utilize type of pseudo mesh with peer to peer
communication, links that support routing. |
SECURE DATA AGGREGATION ALGORITHM AND ROUTING PATH PROTOCOL |
Several researchers have studied problem related to data aggregation in wireless sensor network. |
“Energy-efficient Data Gathering in Wireless Sensor Network [6]” The problem of data gathering in environments
where data from the different sensors are correlated. Authors in independently proposed, how best the data may be
fused inside the network using 1) cues from the network state, 2) energy-efficient aggregation trees rooted at the sink,
and 3) congestion reduction techniques. |
“Cue-based Networking [20]” New approach called cue-based networking that uses hints or cues about the physical
environment to optimize networked application behaviour. Results reveal that have proposed probabilistic algorithm. |
“Sink-to-sensor Congestion Control [8]” Here, only focus on providing congestion control from the sink to the sensors
in a sensor field. They identify the different reasons for congestion from the sink to the sensors and show the
uniqueness of the problem in sensor network environments. The generic framework has been designed that addresses
congestion from the sink to the sensors in a sensor network. Author proposed an adaptive, explicit rate control
approach, called Congestion control from SInk to SEnsors (CONSISE). |
“Scalable Correlation-Aware Aggregation [6] [7]” Sensors-to-sink data in WSNs are typically characterized by
correlation along the spatial, semantic, and/or temporal dimensions. Here, they identify that most of the existing
upstream routing approaches in WSNs can be when compared with Decentralized Shortest Path Trees (DPST); authors
observe that the cost of DSPT is up to 200% of SCT cost, as the number of nodes increases. The cost of DSPT s also
increases faster than that of the SCT approach as node number increases translated to a correlation-unaware data
aggregation structure - the shortest-path tree (SCT). |
“Distributed Source Coding in Sensor Networks [14] [15] [16][17]” DSCISN focus on two different types of
correlation - near and far correlation. Near correlation, define as the correlation between content sent by sensors in the
same vicinity. For example, the detection of the same event by multiple sensors in a region will result in near
correlation. Far correlation, define as the correlation between content sent by sensors that are far apart. Such correlation
can happen due to either large range events or semantic correlation between data sent by far apart sensors. Here assume
that it’s have full knowledge of the correlation values before sensor deployment. This prior information is used to
optimally design the source coding. Each node compresses its data without communicating with the other node and
sends the compressed data to the next node that is closer to the sink. Here author propose a novel clustering scheme
called Annular Slicing-based Clustering, and show that the proposed scheme performs near-optimally. |
“MAC-Free Reading of Correlated Sensor Networks [6] [10]” The data gathering process is the first step towards
realizing a complete network solution for WSNs. While the classical approach establishes multihop routes to the sink
from the sources, it involves considerable energy expense. Here author investigate a cooperative approach for aerial
reading of a wireless sensor network. More specifically, a data aggregation method called as cooperative spectrum
fusion (CSF) is devised to read data from the WSN without using Medium Access Control (MAC) signalling. |
DATA AGGREGATION USING MATHEMATICAL IMPLEMENTATION |
Max/Min Aggregation Function to proposed two Methods of algorithm such as Method (1): Cluster based Private Data
aggregation (CPDA) Based on the leverages clustering protocol and Algebraic properties of polynomial function [18]
[19]. Each sensor node find out the neighbours share common key with itself and path key assigned to the pair of
neighbour sensor node that do not share common key but can be connected by two or more mutihop secure links. With
Key pool size K=1000, Key ring size R = 200. |
|
Step 1: The first step in CPDA is to construct cluster to perform intermediate aggregation,
Let assume Q=query server or sink node. |
Step 2: Q –query by a hello message, upon receiving the hello message. |
Step 3: A sensor node elects itself as cluster leader Pc (probability of cluster leader), the cluster leader was
preselected parameter for all the nodes and it will forward the hello message to neighbour’s. |
Step 4: Otherwise a node waits for a certain period of time to get hello message its neighbour’s, and then it decides to
join one of the cluster by broadcasting a join message. |
Node A Calculate: |
|
Similar only node and calculate for regenerating function, here is aggregate power. The node A Encrypts and
send to B using the sharing key between and . Similarly node Encrypts to , to .Node A Calculate
Assembled values |
|
Similarly node node calculate Assembled values, where |
|
PROBLEM SOLUTION |
In this article, a sensor network is modelled as a Cartesian product of set ( ), where sensor node set are represented
as A, the fact that a sensor data of a set (denoted by € ), we call it as belongs to . The total of data set is called
elements. If is Malicious node, m is not an element of , then we write ( € ).Suppose are four
set of region or domain and each domain have lot of element. So sensor element can cope with separate regions.
In case is a total densely set of area WSN architecture, then we say that is a sub set of and example
. If are two sets, then is the authorized node or . Provided
the same result of value is denoted by . |
The proposed new equally pair wise key rules: |
|
|
|
Consider the arrow diagrams observe that there is an arrow from to which is followed by an arrow from to
, we can view these two arrows as a path, which connects the sink node . |
|
EVALUATION |
Verifying the Key Rule using tree method |
We can view these two arrow as a “path” which “connect” the element 2∈B to the element Z∈D,2(BoC) since 2to d and
d to z similarly there is path from 3 to z. |
|
|
|
(i) Condition I ( n is even) |
|
(ii)Condition II (n is odd) |
|
Solution will be analyse matrix format: |
|
The D of linear equation is equivalent to the matrix equation A(B)= D, were 1(-0) = -0,2(-1) = -2,3(-2) = -6,4(-3) =
12.Let B(x,y) be the statement //x,y sensor node |
Statement 1: “ is the best friend of ”. |
The meaning is that, for every sensor node x there is another neighbour node of y, such that y is the best friend of x
and if z is a node other than , but z is not best friend of x |
Statement 2: Let observe the sentences used and Related Expression |
For every node x∀x |
There is other node y∃y
y is the best friend of x B (x,y)
z is the node other than z≠y
z is not best neighbour node of
For every node other than y∀z (z≠y)
Calculation of the total communication in the network: Next, We Propose accuracy in a formal measures for the SRA. |
|
Example of verification Line Plane Diagram |
Ln Maximum number of regions defined by n- lines in the plane as following, |
Step ( i) n =0 the plane with no lines implies that one Region L0 = 1 |
Step (ii) the plane with one line implies that it has two Region L1=2 |
|
Step (iii) n=2 the plan with one line implies that two region L2 = 4 |
|
Step(iv): n=3 plan with three lines implies that it has following seven Region L3=7(4+3)→L2+3 |
|
|
Sensor node Moving path using Translating Method |
Transfer the all node from c to d |
Transfer the data from node k(1) to K(x) k(1)→k(a),k(c) |
k(a)→k(x),k(c)→k(y) 3 Moves |
Transfer the data from node k(2) to k(z) k(2)→k(d)→k(z) 2 Moves |
Transfer the data from node k(3) to k(x) k(3)→k(a),k(b) |
k(a)→k(x),k(b)→k(x) 3 Moves |
Transfer the data from node k(4) to k(z) k(4)→k(d)→k(z) 1 Moves |
Total Number of Moving path 9 Moves |
Algorithm1: Agg(fun(K(n)) // Aggregation of key function |
Step1: Let work and complete be Aggregate Information f(n), are sensor node.100oC 200oC 300oC are
sensor Information respectively. Initialize Work: = Currently process and Complete [a]: = false for 1, 2, 3, 4, 5,
6……….n. |
Step2: Find and ‘a’ such that nearest node |
(i) Complete [a] = false |
Step3: Incomplete process means node ‘ ’ intimate sink node. The sink node to re- arranges order and produce the key
using mathematical condition Re-arrange [order] = a ↔b, b↔c, c↔d, d↔x, x↔y, y↔z. |
(ii) Need ≤ work. If no such a exists (go to step 4) // ‘a’ have false means Work = work + re-process node =
node + key(n). |
|
Step4: If Complete [a] =true.For all a, b, c, d, x, y, z. Then the node is in a safe state. |
Algorithm2: Sec(fun(Loc Pi)) |
The Security Algorithm assumes that the path link are failure or not and that process send this message to the nearest
neighbour on their node. In this algorithm we proposed security file list, a list that contain the seniority (or)
Alphabetical order of all process node. When the Algorithm ends, each process maintain its OWS file LIST. |
Step1: If process Pi detects a path failure, it create a new path file list that is initially empty, then sends a
Acknowledgement Message to its right nearest neighbour, and add the new path link Li to its FILE LIST. |
Step2: If next node (Nj) receive a message from the process on the list |
(a) If this is the first(sec) message it has send,
Pi Create a new path list Pi→Nj P[i]=ΣP (i =key) |
(b) if(Pi≠nj) that is message received does not contain Pi then Pi add j to path list and forward the Message to
its right neighbour. |
(c) if Pi=nj, that is after receiving the (LOC FILE LIST) message, than path list for Pi contain the number of
path list in the file. |
CONCLUSIONS |
In our proposed WSNs provide better power computation capacities and memory, the storage method in such that
networks might expose to the Densely Traffic Collusion Attack targets. In this situation it’s very difficult for
continuously surveillance. So, it is a challenging task to provide security to the data. In this paper, we propose a New
Sequence Key (NSKey) Algorithm to avoid the Densely Traffic Collusion Attack. In particular, we present a Path File List (PFlist) Algorithm which the sink node can determine if the compute aggregate (SRA Value) include any wrong
contribution. Assignments and also discuss the non-uniform File-list (Loc) algorithms for the slotted Aggregation
function. |
|
Figures at a glance |
|
|
Figure 1 |
Figure 2 |
|
|
References |
- I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A survey on sensor networks” IEEE Commun. Mag., 40 (8) (2002), pp.102–114.
- J. Yick, B. Mukherjee, D. Ghosal., “Wireless sensor network survey” Comput. Networks, 52 (12), pp. 2292–2330, 2008.
- K. Akkaya, M. Demirbas, R.S. Aygun, “The Impact of Data Aggregation on the Performance of Wireless Sensor Networks”, Wiley Wireless Commun. Mobile Comput. (WCMC) J 8, pp. 171–193, 2008.
- J. Newsome, E. Shi, D. Song, A. Perrig, “The Sybil attack in sensor networks: analysis and defences” IEEE/ACM Information Processing in Sensor Networks (IPSN’04), pp. 259–268, 2004.
- A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D., “Culler SPINS: security protocols for sensor networks” Wireless Networks J. (WINE), 2 (5) , pp. 521–534, 2002.
- R. Cristescu, B. Beferull-Lozano, M. Vetterli, “On network correlated data gathering”IEEE Computer and Communications Societies, vol. 4, pp. 2571–2582, 2004.
- S. Lindsey, C. Raghavendra, K.M. Sivalingam Data gathering algorithms in sensor networks using energy metrics IEEE Trans. Parallel Distrib. Sys., 13 (9), pp. 924–935, 2002.
- R. Vedantham, R. Sivakumar and S.-J. Park, "Sink-to-Sensors Congestion Control," Elsevier Ad Hoc Networks Journal, vol. 5, no. 4, pp. 462- 485, May 2007.
- A. Akanser and M. A. Ingram, "MAC-free Cooperative Spectrum Fusion (CSF) in Wireless Sensor Networks (WSN)," IEEE Transactions on Aerospace and Electronic Systems (AES), 2008.
- A. Akanser and M. A. Ingram, "MAC-free reading of a network of correlated sensors," IEEE Conference on Military Communications (MILCOM), 2007.
- B. N. Vellambi and F. Fekri, "Finite-Length Rate-Compatible LDPC Codes: A Novel Puncturing Scheme," IEEE Transactions on Commmunications, April 2008.
- K. Sundaresan, Y. Zhu, and R. Sivakumar, "Exposing two critical myths about correlation aware data aggregation," ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), May 2005.
- K. Sundaresan, Y. Zhu, and R. Sivakumar, "Practical limits on achievable energy improvements and useable delay tolerance in correlation aware data gathering in wireless sensor networks,"IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Network (SECON), Santa Clara, California, 2005.
- M. Sartipi and F. Fekri, "Distributed Source Coding in Wireless Sensor Networks using LDPC Coding: A Non-uniform Framework," IEEE Data Compression Conference, pp. 477-477, March 2005.
- M. Sartipi and F. Fekri, "Distributed source coding in wireless sensor networks using LDPC coding: The Entire Slepian-Wolf Rate Region," IEEE Wireless Communications and Networking Conference, March 2005.
- M. Sartipi and F. Fekri, "Distributed Source Coding using Finite-Length Rate-Compatible LDPC Codes: The Entire Slepian-Wolf Rate Region," IEEE Transactions on Commmunications, Vol. 56, No. 3, March 2008.
- M. Sartipi and F. Fekri, "Lossy Distributed Source Coding Using LDPC Codes," IEEE Communication Letters, May 2008.
- R. Subramanian and F. Fekri, "A Clustering-based Framework for Energy Aware Data Gathering in Distributed Sensor Networks," Journal of Ad-Hoc and Sensor Wireless Networks, August 2008.
- S.-J. Park, Y. Zhu, R. Vedantham and R. Sivakumar, "A scalable correlation aware aggregation strategy for wireless sensor networks," in IEEE International Conference on Wireless Internet (WICON), Budapest, Hungary, 2005.
- Y. Jeong, S. Lakshmanan, S. Kakumanu, and R. Sivakumar, "Cue-based Networking using Wireless Sensor Networks: A Video-over-IP Application," IEEE Comm, Society Conf. on Sensor, Mesh and Ad hoc Communications and Networks (SECON), San Francisco, CA, June 16- 20, 2008.
- Y. Zhu, R. Vedantham, S.-J. Park and R. Si Park and R. Sivakumar, "A Scalable Correlation Aware Aggregation Strategy for Wireless Sensor Networks," Elsevier Information Fusion, Journal, 2007.
|