International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7,Issue-11  ( Nov, 2019 )
Past issues
  1. Volume-7, Issue-10  ( Oct, 2019 )
  2. Volume-7, Issue-9  ( Sep, 2019 )
  3. Volume-7, Issue-8  ( Aug, 2019 )
  4. Volume-7, Issue-7  ( Jul, 2019 )
  5. Volume-7, Issue-6  ( Jun, 2019 )
  6. Volume-7, Issue-5  ( May, 2019 )
  7. Volume-7, Issue-4  ( Apr, 2019 )
  8. Volume-7, Issue-3  ( Mar, 2019 )
  9. Volume-7, Issue-2  ( Feb, 2019 )
  10. Volume-7, Issue-1  ( Jan, 2019 )

Statistics report
Jan. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 82
Paper Published : 1209
No. of Authors : 3038
  Journal Paper

Paper Title
Recoverable Concealed Data Aggregation Using Shared Key Signature In Wireless Sensor Networks

Abstract
Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Wireless sensor networks consist of large number of sensor nodes with sensing and communication capabilities. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In privacy homomorphism encryption, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. To overcome the above two drawbacks, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable”. In this paper, we are going to recover the concealed data aggregation for authenticity and data integrity in wireless sensor networks. The aim of the project is to use shared key signature algorithm for providing security and authenticity in wireless sensor network. This technique is an enhancement over existing encryption and signature verification algorithms. Here the key used for each sensor is shared for these algorithms. It reduces memory usage and delay in communication.


Author - Suchithra M. S, L. Malathi

| PDF |
Viewed - 20
| Published on 2014-01-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY