Sulur,Coimbatore Sulur,Coimbatore

Size: px
Start display at page:

Download "Sulur,Coimbatore Sulur,Coimbatore"

Transcription

1 A STUDY ON DIFFERENT DATA AGGREGATION TECHNIQUES IN DISTRIBUTED SENSOR NETWORKS Dr. D. FRANCIS XAVIER CHRISTOPHER M.sc, Mphil(CS),PGDPM&IR, Ph.D 2. C. AKALYA, MCA Director, School Of Computer Studies Mphil(CS) Research Scholar RATHNAVEL SUBRAMANIAM RATHNAVEL SUBRAMANIAM COLLEGE OF ARTS AND SCIENCE COLLEGE OF ARTS AND SCIENCE Sulur,Coimbatore Sulur,Coimbatore Abstract Mobile devices such as smart phones are gaining an ever-increasing popularity. Most smart phones are equipped with a rich set of embedded sensors such as camera, microphone, GPS, accelerometer, ambient light sensor, gyroscope, and so on. The data generated by these sensors provide opportunities to make sophisticated inferences about not only people (e.g., human activity, health, location, social event) but also their surrounding (e.g., pollution, noise, weather, oxygen level), and thus can help improve people s health as well as life. To address these problems, this paper proposes an efficient protocol to obtain the Sum aggregate, which employs an additive homomorphic encryption and a novel key management technique to support large plaintext space. The thesis also extends the sum aggregation protocol to obtain the Min aggregate of time-series data. It shows that the proposed protocols are faster than existing solutions, and it has much lower communication overhead. In addition, the paper proposes a new concealed data aggregation scheme which is homomorphic public encryption system based. The proposed scheme has three contributions. First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the Index Terms- Cluster-Based Periodic Sensor Network (CPSN), CONCEALED Data aggregation (CDMA), Clustering topology, Big-Data Sensing, Similarity and Distance function, Group of nodes can communicate with a single node in secure manner. I.INTRODUCTION The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This thesis studies how an un trusted aggregator in mobile sensing can periodically obtain desired statistics over the data contributed by multiple mobile users, without compromising the privacy of each user. Although there are some existing works in this area, they either require bidirectional communications between the aggregator and mobile users in every aggregation period, or have high-computation overhead and cannot support large plaintext spaces. Also, they do not consider the Min aggregate, which is quite useful in mobile sensing. In addition, Database as a Service model is proposed in which, a client stores her database on an un trusted service provider. Therefore, the client has to secure their database through Privacy Homomorphism (PH) schemes because PH schemes keep utilizable properties than standard ciphers. PH scheme provide aggregation queries and results. Fig. 1. Data aggregation based on clustering Network Topology. In Fig. 1, Data transmission between member nodes and their appropriate CH or between CHs and the sink is based on single-hop communication. Member nodes collect data in a periodic manner. Subsequently, each member node sends its data to the appropriate CH at each period. Sensor nodes sense environment at a fixed sampling rate where each ea one takes t measures at each Period. 1511

2 II.RELATED WORKS 2.1 DRAWING DOMINATE DATASET FROM BIG SENSORY DATA IN (WSNs) The Technical describes the increasing popularity of Wireless Sensor Networks (WSNs), the amount of sensory data manifests an explosive growth. In many applications, the scale of the sensory data has already exceeds several peta bytes (PB) annually. The amount of sensory data manifests an explosive growth due to the increasing popularity of Wireless Sensor Networks. The scale of the sensory data in many applications has already exceeds several peta bytes annually, which is beyond the computation and transmission capabilities of the conventional WSNs. On the other hand, the information carried by big sensory data has high redundancy because of strong correlation among sensory data dominant dataset, which is only a small data set and can represent the vast information carried by big sensory data with the information loss rate being less. This prove that drawing the minimum dominant dataset is polynomial time solvable and provide a centralized algorithm with O(n 3)time complexity. Furthermore, a distributed algorithm with constant complexity (O(1)) is also designed. It is shown that the result returned by the distributed algorithm can satisfy the requirement with a near optimal size. Finally, the extensive real experiment results and simulation results are carried out. The results indicate that all the proposed algorithms have high performance in terms of accuracy and energy efficiency. 2.2 AN ENERGY-EFFICIENT GRID BASED CLUSTRING TOPOLOGY FOR A (WSNs) The Wireless Sensor Network (WSN) is an emerging technology. Wireless Sensor Network composed of a set of tiny sensor nodes. The nodes are continuously sense and transmit the data. WSN have a wireless nature, due to this has a limited lifetime. So increase the lifetime of Wireless Sensor Network and Minimize energy cost in wireless sensor network are an important problem. To solve this problem clustering technique are always used, among the entire clustering technique grid based clustering is more efficient. Grid based clustering is more simple and feasible, and has so much advantage with respect to other clustering method. In this we proposed a grid based clustering algorithm for minimizing energy consumption, where clustering is formed depending upon the interest of nodes each cluster has a coordinator or master head i.e. the cluster head (CH). For CH selection any algorithm can be applied with our work. In Cluster formation process, Firstly a cluster head is selected then with the collaboration of BS clusters are formed and finally routing is carried out. The cluster head selection phase starts and all the deployed nodes send their energy levels to the Base Station. Then on the basis of energy level, geographical area and least id cluster head are selected. Network deployment is considered as manual so the base station is well informed about the geographical locations of the nodes. Base Station will select the cluster heads and multicast this information to them. Fig 2. Cluster based Model In Fig 2. In clustering scheme network is grouped into different clusters Each cluster is composed of one cluster head (CH) and cluster member nodes. The respective CH gets the sensed data from cluster member nodes, aggregates the sensed information and then sends it to the Base Station. 2.3 CLUSTER-BASED COMB-NEEDLE MODEL FOR ENERGY EFFICIENT DATA AGGREGATION(WSNs) The information discovery and aggregation in large scale wireless sensor networks applied for missioncritical applications like military reconnaissance. To support query processing based on the gathered information, an efficient and reliable information discovery mechanism is proposed for sensor networks. 1512

3 We extend the basic Comb-Needle Discovery Support Model by including Cluster-based data aggregation We assume that frequency of Query fq, the Frequency mechanism, which helps minimize the communication data event is fe are written as fe/fq.i.e., Number of Events Cost. generated per query in a needle is l-1(fe/fq). Since Cl =l-1, So We can write event generated cost per Cluster based approach groups the sensor nodes in the needle is. sensor network. Each node of a group will send information to its Cluster Head, which then aggregates Cost per needle = Cl(fe/fq) Eq(2.1) and forwards the information to the base station (Sink). We compare the performance of proposed Cluster-based The query data dissemination cost for basic Comb- Comb-Needle Model with the basic Comb-Needle Model Needle model and Cluster-based approach is same so we using the parameters, namely, energy consumption and consider Cqd [3], is communication cost. The experimental results Avrora simulator on Tiny OS Cqd-n-1+(n-1)+1..Eq(3) Platform reveal that Cluster based Comb-Needle Model for Data Aggregation helps a sensor network in conserving its energy, and thereby extending its life time Analysis Of The Cluster-Based Comb Needle Model The above calculates the cost to form one vertical query line and one horizontal query line. Note that, if s=l, the query data dissemination reaches its better level; it means cluster head collects the information from nodes. The values of s and l are determined by Cluster-based combneedle model. In this section, we analyze the comb-needle structure formed by the Cluster-based model. It is assumed that the total number of sensor nodes in the network, the number of clusters and their sizes are fixed by the designer of WSN application as integral values. We assume a regular n x n grid, and N is the total number of nodes. N=nXn.Eq (1) The communication cost for each query is estimated as follows: Each event generation forms a needle of length l from comb and thus communication cost for each needle is The query response cost depends on data aggregation scheme used to reply data. Here we are using Clusterbased approach; each node pushes its data towards cluster head. The data is pushed vertically upward or down ward towards the cluster head depends on event generated location The data is pushed horizontally and vertically upward if event is generated Upward=l+n+d Eq (4) Then data is pushed horizontally and vertically downward if event is generated Downward =l+ (n-d) + (d-d1) Eq (4.1) Cl =l-1... Eq (2) We assume that an event can be generated by any Node the following parameters are defined: fq = Query frequency fe = Event frequency fd = fe/n2, Frequency of events per sensor node Note that the communication cost depends on whether unicast or broadcast is used. Here we consider unicast for simple analysis. The cost of building a single needle of length l is l-1. Combining (4) and (4.1) to get the Query reply cost for basic Comb-Needle model. Cqr=2(n+l) Eq (4.2) To find the needle in 1 hop the cost is reduced 50% in Cluster-based Comb-Needle model.(i.e., data traversed only in one direction in Cluster-based Comb-Needle Model) So we will get n+l Approximately Cqr=n+l Eq (4.3) 1513

4 Our main aim is to minimize the communication cost. In summary, the complete cost per query consists of duplicated data cost, Cluster-based comb building cost and response reply cost. 2.4 DYNAMIC DATA AGGREGATION PROTOCOL BASED ON MULTIPLE OBJECTIVE TREE IN (WSNs) A Data aggregation has been widely applied as efficient techniques in order to reduce the data redundancy and the communication load in Wireless Sensor Networks (WSNs). However, for dynamic scenarios, structured protocols may incur high overhead in the construction and the maintenance of the static structure. Without the explicit downstream and upstream relationship of nodes, it is also difficult to obtain high aggregation efficiency by using structure-free protocols. In order to address these aspects, we propose a semi-structured protocol based on the multiobjective tree. The routing scheme can explore the optimal structure by using the Ant Colony Optimization (ACO). Moreover, by using the prediction model for the arriving packets based on the sliding window, The adaptive timing policy can reduce the transmission delay and enhance the aggregation probability. Therefore, the packet transmission converges from both spatial and temporal points of view for the data aggregation procedure. Finally, simulation results validate the feasibility and the high efficiency of the novel protocol when compared with other existing approaches. 2.5 APPROXIMATE HOLISTIC AGGREGATION IN (WSNs) This techniques Holistic aggregation results are Important from Wireless Sensor Networks (WSN). Holistic aggregation requires all the sensory data to be sent to the sink, which costs a huge amount of energy. Fortunately, in most application, approximate results are acceptable. The approximated holistic aggregation based on uniform sampling. In this paper four holistic aggregation operations are investigate. The mathematical methods to construct their estimators and determine the optional sample size are proposed, and the correctness of these methods is proved. Four corresponding distributed holistic algorithm are presented. The theoretical analysis and simulation results show that the algorithms have high performance. The amount of sensory data generated by a (WSN) is always huge and redundant. The summary information returned by aggregation operations is thus more meaningful Aggregation operations can be classified as Distributable, algebraic and holisticons. The information returned by holistic aggregations is the most valuable but all sensory data needs to be transmitted for the exact results, which costs high energy consumption. Considering approximate aggregation results are acceptable some approximate holistic aggregation techniques were proposed. which save lots of energy but have a fixed error bound and cannot satisfy an arbitrary precision requirement. III. METHODOLOGY 3.1 AGGREGATION PROTOCOL FOR SUM In this protocol, the setup phase only runs once. After the setup phase, the key dealer does not need to distribute secrets to the users and the aggregator again. In addition, the users and the aggregator do not have to synchronize their key generations with communications in every time period. Fig. 3 Adaptive Timer These restrictions make it challenging for the users and Fig. 3. The used to explain this situation. The time the aggregator to generate their keys such that (3) holds in interval Tw can be saved, and the whole aggregation every time period and the encryption (decryption) key process is speed up, and finally, the application delay used by each user (the aggregator) cannot be learned by can be further reduced. any other party besides the key dealer. 1514

5 To proposed a construction for key generations that preserves the privacy of each user and the Sum aggregate efficiently. Before presenting this construction, it first discusses a straw-man construction which is very efficient for the users but not efficient for the aggregator. Then, it extends to straw-man scheme to derive this construction. Both constructions include three processes, which are secret setup, encryption key generation, and decryption key generation. They proceed in the Setup phase, Enc phase, and AggrDec phase of the aggregation protocol, respectively. s Si Decryption key generation.intimeperiod t IN,the aggregator generates the decryption key by computing k 0 = ( h(fs (t))) mod M (5) s S Aggregation Protocol For MIN The Min aggregate is defined as the minimum value of the users data. This section presents a protocol that employs the Sum aggregate to get Min Protocol Overview Setup. The key dealer assigns a set of secret values (secrets for short) to each user and the aggregator. Enc. In each time period, user i (i 1,n]) generates encryption key ki using the secrets that it is assigned. It encrypts its data xi by computing ci = (ki + xi) mod M.(1) where M = 2 log2 (n). Then, it sends the cipher text ci to the aggregator. AggrDec. In each time period, the aggregator generates Decryption key k0 using the secrets that it is assigned, and decrypts the sum aggregate N k 0 = ( ki) mod M (3) i=1 Encryption key generation. In time period t IN, user I generates its encryption key by computing. K i = (h(fs (t)) - h(fs (t))) mod M (4) s Si Fig.4. Derivative Data[Last Row Is Data Sum of All Users] In Fig.4. This scheme gets the Min aggregate of each time period using + 1 parallel Sum aggregates in the same time period. The sums used to obtain Min are n based on a number of 1bit derivative data (denoted by d) S = xi by computing derived from the users raw data x. Without loss of i=1 generality, it is assumed is a power of two.aggregate data. n The scheme works as follows: In each time period, each S = ( ci-k0) mod M (2) i=1 user generates + 1 derivative data d[0], d[1],..., d[, The keys are generated using a PRF family and a lengthmatching where each derivative data correspond to one possible hash function (see later). According to the data value in the plaintext space. For each j [0, ], the aggregator can get the correct sum so long as the following equation hold user assigns 1 to d[j] if its raw data value is equal to j and assigns 0 otherwise. For each j [0, ], the aggregator can obtain the Sum aggregate of d[j] using the sum aggregation protocol presented. Then, Min is the smallest j that returns a positive sum. In each time period, each user involves in + 1 sum aggregates over + 1 derivative data. Each user uses just one set of secrets for all instances of the sum aggregation protocol. 1515

6 3.1.3 Aggregation Protocol For MAX The Max aggregate is defined as the maximum value of the users data. The protocol that employs the Sum aggregate to get Max is same as except Max is the biggest j that returns a positive sum. 3.2 RELAXING THE ASSUMPTION OF TRUSTED KEY DEALER IV.CONCLUSION This project studied Sum aggregation protocol in WSN environment and it also proposed Min and Max aggregate of time-series data. This project also studied CDAMA scheme for a multi-application environment, which is the first scheme. Through CDAMA, the cipher texts from distinct applications can be aggregated, but not mixed. Instead of relying on a trusted key dealer, our protocol can be easily adapted to work with an honestbut-curious key dealer that does not collude with the aggregator. An honest-but-curious key dealer correctly follows the protocol steps, but wants to get users data values from the transcript of messages in the protocol. To provide privacy under this model, the protocol adds one more encryption and decryption to the data that each user submits to the aggregator. More specifically, each user encrypts its data using the secrets assigned by the key dealer to derive an intermediate result z, encrypts z with a key pre-shared with the aggregator, and then sends the obtained cipher-text to the aggregator. The aggregator first uses the pre-shared key to decrypt each user s intermediate Result z, and then decrypt noisy some with the secrets received from the key dealer. The key dealer cannot obtain the intermediate result z of any user, as long as it does not collude with the aggregator. Hence, it cannot get any user s data value. The honest-but-curious model is realistic because it can For a single-application environment, CDAMA is still more secure than other CDMA schemes. When compromising attacks occur in WSNs, CDAMA mitigates the impact and reduces the damage to an acceptable condition. Besides the above applications, CDAMA is the first CDA scheme that supports secure counting. The base station would know the exact number of messages aggregated, making selective or repeated aggregation attacks infeasible. Finally, the performance evaluation shows that CDAMA is applicable on WSNs while the number of groups or applications is not large. In addition, it applied CDAMA to realize aggregation query in Database-As-a-Service (DAS) model. In DAS model, a client stores her database on an un trusted service provider. V. REFERENCES [1] S. Cheng, Z. Cai, J. Li, and X. Fang, Drawing dominant dataset frombig sensory data in wireless sensor networks, 2015 IEEE be enforced with trusted hardware. In practice, certificate Conferenceon Computer Communications authorities such as VeriSign (which already provides key (INFOCOM), pp , 2015 management services) may serve as the key dealer. Since [2] K. R. Bhakare, R. Krishna, and S. Bhakare, these authorities usually undergo extensive audits, An energy-efficient grid based clustering collusion with the aggregator can be mitigated. topology for a wireless sensor network, More aggregate statistics. In the basic aggregation International Journal of Computer Applications, scheme for Min presented above, the aggregator can vol. 39, no. 14, 2012 actually get the number of times that each possible data [3] M. Shanmukhi and O. Ramanaiah, Clusterbased comb-needle model for energy-efficient value appears, and derive the accurate distribution of the users data in the plaintext space [0, data aggregation in wireless sensor networks, Applications and Innovations in Mobile Computing (AIMoC), pp ,

7 [4] Y. Lu, I. Comsa, P. Kuonen, and B. Hirsbrunner, Dynamic data aggregation protocol based on multiple objective tree in wireless sensornetworks, Tenth International Conference on Intelligent Sensors, SensorNetworks and Information Processing (ISSNIP), IEEE, pp. 1 7, [5] J. Li, S. Cheng, Y. Li, and Z. Cai, Approximate holistic aggregation in wireless sensor networks, Proceeding 35th IEEE International Conference on Distributed Computing Systems (ICDCS), pp ,

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Qinghua Li, Guohong Cao, Thomas F. La Porta Department of Computer Science and Engineering The Pennsylvania State University Email: {qxl8,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 Multiple Sensor Application using Secure Data Aggregation Shanthi.G.S 1, Chandrakala.K.R.S 2 1, 2 Department of Computer Science and Engineering, Sriram Engineering College,Perumalpattu 602 024 Abstract

More information

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security Chapter I INTRODUCTION This thesis provides an introduction to wireless sensor network [47-51], their history and potential, previous deployments and engineering issues that concern them, and the security

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network ISSN (e): 2250 3005 Volume, 06 Issue, 06 June 2016 International Journal of Computational Engineering Research (IJCER) Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks

A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks Journal of Computing and Information Technology - CIT 22, 2014, 1, 1 20 doi:10.2498/cit.1002318 1 A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks Joyce Jose, Josna

More information

Privacy Preserving Collaborative Filtering

Privacy Preserving Collaborative Filtering Privacy Preserving Collaborative Filtering Emily Mu, Christopher Shao, Vivek Miglani May 2017 1 Abstract As machine learning and data mining techniques continue to grow in popularity, it has become ever

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data

GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data Wensheng Zhang, Chuang Wang and Taiming Feng Department of Computer Science, Iowa State University, IA 50011 Email:

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Rotation-based Privacy-preserving Data Aggregation in Wireless Sensor Networks

Rotation-based Privacy-preserving Data Aggregation in Wireless Sensor Networks Rotation-based Privacy-preserving Data Aggregation in Wireless Sensor Networks Xiaoying Zhang, Hong Chen, Ke Wang, Hui Peng, Yongjian Fan, Deying Li Key Laboratory of Data Engineering and Knowledge Engineering

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life

Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life Ch.Srilakshmi Asst Professor,Department of Information Technology R.M.D Engineering College, Kavaraipettai,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Enhanced Leach for Better Cluster Management Using MAX-HEAP

Enhanced Leach for Better Cluster Management Using MAX-HEAP Enhanced Leach for Better Cluster Management Using MAX-HEAP Rajni Kamboj 1, Rohit Chahal 2 1 M.Tech Scholar, Dept.of CSE, Haryana Engineering College Jagadhri 2 Lecturar CSE,Haryana Engineering College,Jagadhri

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will

More information

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and

More information

MTAT Research Seminar in Cryptography Building a secure aggregation database

MTAT Research Seminar in Cryptography Building a secure aggregation database MTAT.07.006 Research Seminar in Cryptography Building a secure aggregation database Dan Bogdanov University of Tartu, Institute of Computer Science 22.10.2006 1 Introduction This paper starts by describing

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland Cryptographic Primitives and Protocols for MANETs Jonathan Katz University of Maryland Fundamental problem(s) How to achieve secure message authentication / transmission in MANETs, when: Severe resource

More information

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

Ad hoc and Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 3: Network architecture Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put

More information

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS Soumyasri S M 1, Dr. Rajkiran Ballal 2 and Ramakrishna Hegde 3 1,2 Computer Science, SDM College, Ujire, Electrical & Electronics,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks

An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks Kyung-Chang Kim 1,1 and Choung-Seok Kim 2 1 Dept. of Computer Engineering, Hongik University Seoul, Korea 2 Dept. of

More information

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks R. Tanuja, M. K. Rekha, S. H. Manjula, K. R. Venugopal, S. S. Iyengar and L. M. Patnaik Abstract Wireless

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

An Energy Efficient Intrusion Detection System in MANET.

An Energy Efficient Intrusion Detection System in MANET. An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of

More information

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING

More information

Mobile Health Monitoring Based On New Power Management Approach

Mobile Health Monitoring Based On New Power Management Approach Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining

Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining CS573 Data Privacy and Security Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining Li Xiong Slides credit: Chris Clifton, Purdue University; Murat Kantarcioglu, UT

More information

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services 1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

Target Tracking in Wireless Sensor Network

Target Tracking in Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 643-648 International Research Publications House http://www. irphouse.com Target Tracking in

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

MOBILE devices such as smart phones are gaining an

MOBILE devices such as smart phones are gaining an IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL., NO. 2, MARCH/APRIL 204 5 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Qinghua Li, Member, IEEE, Guohong Cao, Fellow, IEEE,

More information

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL Kunal M Pattani 1, Palak J Chauhan 2 1 Professor,C.U.Shah College of Engineering and Technology Wadhwan City Gujarat, India. 2 M.E Student, Dept.

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

EFFICIENT PRIVACY-PRESERVING STREAM AGGREGATION IN MOBILE SENSING WITH LOW AGGREGATION ERROR

EFFICIENT PRIVACY-PRESERVING STREAM AGGREGATION IN MOBILE SENSING WITH LOW AGGREGATION ERROR EFFICIENT PRIVACY-PRESERVING STREAM AGGREGATION IN MOBILE SENSING WITH LOW AGGREGATION ERROR QINGHUA LI, GUOHONG CAO DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING THE PENNSYLVANIA STATE UNIVERSITY UNIVERSITY

More information

A Proposal for a High Speed Multicast Switch Fabric Design

A Proposal for a High Speed Multicast Switch Fabric Design A Proposal for a High Speed Multicast Switch Fabric Design Cheng Li, R.Venkatesan and H.M.Heys Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John s, NF, Canada AB X

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks Hogil Kim and Eun Jung Kim Department of Computer Science Texas A&M University College Station,

More information

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2 Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2 1 PG Scholar, 2 Assistant Professor Kathir College of Engineering Coimbatore (T.N.), India. Abstract

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Context-Aware Query for High-Voltage Transmission Line Fault Detection using Wireless Sensor Network

Context-Aware Query for High-Voltage Transmission Line Fault Detection using Wireless Sensor Network Context-Aware Query for High-Voltage Transmission Line Fault Detection using Wireless Sensor Network Paulo Régis C. de Araújo Department of Telematics Instituto Federal do Ceará Email: pregis@ifce.edu.br

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information