Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/1625
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Solanki, Paresh M. | - |
dc.date.accessioned | 2010-06-23T04:27:20Z | - |
dc.date.available | 2010-06-23T04:27:20Z | - |
dc.date.issued | 2010-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/1625 | - |
dc.description.abstract | The rapid advancement of hardware technology has enabled the development of small, powerful, and inexpensive sensor nodes, which are capable of sensing, computation and wireless communication. This revolutionizes the deployment of wireless sensor network for monitoring some area and collecting regarding information. However, limited energy constraint presents a major challenge such vision to become reality. The main task of such a network is to gather information from node and transmit to the base station for further processing. In WSN 70% of energy consumption is due to data transmission. First, Due to hostile environment and unique properties of wireless sensor network we do not want to send all raw data samples directly to the sink node Hence Data aggregation is required. Second, Wireless sensor nodes are often deployed in an open environment such as a battlefield. Thus, attackers can capture sensor nodes to steal secret data or reprogram them to execute malicious code. Hence secure data aggregation is required. End to End secure encrypted data aggregation is better than hop by hop secure data aggregation because Hop by Hop secure data aggregation is resource consuming. Currently different schemes are available for end to end secure encrypted data aggregation but they required some more enhancement. Hence implement or enhance the light weight secure data aggregation (minimal security primitives) scheme like Concealed Data Aggregation scheme. In this Major Project, I have used the JIST/SWANS simulator for implementation. First Implemented the energy model for JIST/SWANS simulator which is measure the energy of each sensor node during idle, receive, transmit mode. Second implemented the Cluster architecture by modified heartbeat application. Third implemented the Secure data aggregation scheme using Privacy Homomorphism which is based on End to End secure data aggregation. I have measured the Energy usage of each sensor nodes during the Data Aggregation and Secure data aggregation Process. | en |
dc.language.iso | en_US | en |
dc.publisher | Institute of Technology | en |
dc.relation.ispartofseries | 08MCE018 | en |
dc.subject | Computer 2008 | en |
dc.subject | Project Report 2008 | en |
dc.subject | Computer Project Report | en |
dc.subject | Project Report | en |
dc.subject | 08MCE | en |
dc.subject | 08MCE018 | en |
dc.title | Secure Data Aggregation in Wireless Sensor Networks | en |
dc.type | Dissertation | en |
Appears in Collections: | Dissertation, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
08MCE018.pdf | 08MCE018 | 632.17 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.