International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 03 | Mar-2017
www.irjet.net
p-ISSN: 2395-0072
Evaluation Of Functional Reputation Based Reliable Data Transmission And Aggregation For Wireless Sensor Networks Dr. Dilip Sharma1, Dinesh Dahima2 1 Assistant 2PG
Professor, Department of Electronics and communication, Ujjain Engineering College, Ujjain, MP, India
Scholar, Department of Electronics and communication, Ujjain Engineering College, Ujjain, MP, India
---------------------------------------------------------------------***--------------------------------------------------------------------onward to the base station one of the aggregate values. At current, expected to constraint of the Computing power and energy resource of sensor nodes, Data is aggregated by extreme simple algorithms like balance. However, such aggregation is common to be actual available to faults, and also particularly, malicious attacks. The relevant form of optimization has been obtained using AES, DES and TDES sequence. A short summary has been given here [6-8].
Abstract - In the field of measurement and instrumentation the wireless sensor network has an important role. One of the major vital aspects in the WSN is energy efficient communication. For this regards, the cluster based protocol for data communication has increasingly become a standard choice for the data communication. For this protocol, data aggregation for sensor data has been used in WSN to save the energy of cluster head By taken consideration of Security and trust three techniques is employed viz., AES based Encryption, decryption and DES based Encryption and Decryption. In this the paper, to identify the trustworthiness of the node and cluster head, the function reputation is used. Moreover, Advanced Encryption Standard (AES) is also compared with the conventional method for secure data transmission. The parameters which are used in this for performance analysis are the reputation value, normalized data transfer time. The simulation results show the AES provides greater security as compared to DES and TDES
1.1 Data Encryption Standard (DES) DES is a Symmetrical Secret Key Algorithm that was promote by IBM. Algorithm uses by different banks and financial companies. Although that adaptation was formed by changing in algorithm for example Key reduced in size. DES is the earlier "data encryption standard"[7].
1.2 Advanced Encryption Standard (AES) Advanced Encryption Standard algorithm is an constant technique relatively than Festal cipher. AES is the replacement of DES as standard symmetric encryption algorithm for US federal organizations. AES need keys of 128, 192 or 256 bits, although, 128 bit keys transfer satisfactory strength today [7].
Keywords: Reliable data aggregation, Aggregation Method, Wireless sensor networks, AES, DES, TDES
1. INTRODUCTION
1.3 Triple DES (TDES)
Wireless Sensor Networks (WSNs) hold the promise of enabling pervasive computing by providing nodes and networks capable of interacting with the physical environment and wireless communication with the wire line computing infrastructure [2-4]. A sensor network protocol must be highly energy efficient while being able to function securely in the presence of possible malicious nodes within the network. Data aggregation is potentially vulnerable to attackers who may inject bogus information or forge aggregated values without being detected. For instance, if a sensor close to the base station is compromised, it may claim a fake aggregation value to the base station and mislead the base station into trusting the fake information [5-8]. It may have a disastrous impact if end users respond according to the faulty information. Compromised nodes have access to cryptographic keys that are used to secure the data aggregation process. In addition, a compromised node that poses as an authorized node in the network cannot be detected using cryptography. Data outside of various sensors is aggregated by an aggregator node what in order that
© 2017, IRJET
|
Impact Factor value: 5.181
In this approach to restate DES implementations. TDES is too slow especially in software implementations due to DES were invented as work in hardware. TDES simply enhance the key size of DES through implement the algorithm 3 times in cycle with 3 other keys. [7]
2. METHODOLOGY We propose in Evaluate the data aggregation by a M-RDAT for WSN’s. At first, the aggregator nodes are select located on the nodes relatedness. At the same time data aggregation, the encryption and authentication key is select to the nodes as long as transmitting data in the direction of data aggregator
|
Perception of REPUTATION and TRUST is taken. Reputation is the fixedness of an object that exists. Trust is the anticipation of single object that exists around the response of other.
ISO 9001:2008 Certified Journal |
Page | 1532