International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Recoverable Concealed Data Aggregation Using Shared Key Signature In Wireless Sensor Networks

Author :Suchithra M. S, L. Malathi

Article Citation :Suchithra M. S ,L. Malathi , (2013 ) " Recoverable Concealed Data Aggregation Using Shared Key Signature In Wireless Sensor Networks " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 81-86, Volume-1,Issue-1

Abstract : Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Wireless sensor networks consist of large number of sensor nodes with sensing and communication capabilities. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In privacy homomorphism encryption, the base station only retrieves the aggregated result, not individual data, which causes two problems. First, the usage of aggregation functions is constrained. Second, the base station cannot confirm data integrity and authenticity via attaching message digests or signatures to each sensing sample. To overcome the above two drawbacks, the base station can recover all sensing data even these data has been aggregated. This property is called “recoverable”. In this paper, we are going to recover the concealed data aggregation for authenticity and data integrity in wireless sensor networks. The aim of the project is to use shared key signature algorithm for providing security and authenticity in wireless sensor network. This technique is an enhancement over existing encryption and signature verification algorithms. Here the key used for each sensor is shared for these algorithms. It reduces memory usage and delay in communication.

Type : Research paper

Published : Volume-1,Issue-1


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-14   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 30
| Published on 2014-01-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY