Secure Data Aggregation in Wireless Network Using Key Based Approach
Author(s):
J.Kiruba Theporal , Christian College of Engineering and Technology Oddanchatram, Tamilnadu-624619, India; M.Sangeetha, Christian College of Engineering and Technology, Oddanchatram, Tamilnadu-624619, India; M.Sasirekha, Christian College of Engineering and Technology, Oddanchatram, Tamilnadu-624619, India; R.Selva Muneeswari Deepika , Christian College of Engineering and Technology, Oddanchatram, Tamilnadu-624619, India; P.Tharcis, Christian College of Engineering and Technology, Oddanchatram, Tamilnadu-624619, India
Keywords:
Data aggregation, Encryption, Decryption, Intermediate node, message digest, secure hash algorithm
Abstract:
Network security has become more important to personal computer users, organizations and the military. The internet is consider as a data network. Data Aggregation is a process of collecting information from surrounding area based on the query arrives from base station and respond or send data to the base station. Here data transmission is taking place using key value and report will be generated as key. In this paper we are going to demonstrate key based approach on the bases of public key cryptosystem. This approach which make data encryption using MD5 algorithm and key generation will be taken place using SHA-1 algorithm both are widely used in security related application. Such algorithms which aggregate data simultaneously and if attack is happened immediately it will send the report to base station. The main advantage of using this approach is to avoid blocking of nodes. The blocked node can be retrieved using screen capturing.
Other Details:
| Manuscript Id | : | IJSTEV2I10039
|
| Published in | : | Volume : 2, Issue : 10
|
| Publication Date | : | 01/05/2016
|
| Page(s) | : | 138-143
|
Download Article