利用安全数据聚合实现QoS最大化的H-WSN

Renuka D. Suryawanshi
{"title":"利用安全数据聚合实现QoS最大化的H-WSN","authors":"Renuka D. Suryawanshi","doi":"10.1109/IC3I.2016.7917950","DOIUrl":null,"url":null,"abstract":"To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"H-WSN with maximized QoS using secure data aggregation\",\"authors\":\"Renuka D. Suryawanshi\",\"doi\":\"10.1109/IC3I.2016.7917950\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.\",\"PeriodicalId\":305971,\"journal\":{\"name\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I.2016.7917950\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I.2016.7917950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

为了执行一些操作,节点上需要一定数量的能量,这与在网络中发送单个数据相同。数据传输在传感器网络中传输数据,减少了网络的生存时间。因此需要降低能耗以提高网络的生命周期。簇头作为集群的聚合节点,在集群成员之间进行通信时,簇头可以多次参与通信。这就是簇头的能量利用率比簇中其他成员高的原因。目前的系统有一种方法可以选择簇头计划外由于其高水平的能源消耗。为了解决这一问题,我们引入了一种基于与基站的距离和剩余能量选择有效簇头的系统表示技术。在选择簇头后,利用了较少的传感器网络能量,有助于提高传感器网络的网络寿命。聚合从集群成员接收到的数据是集群中集群头的职责。数据的验证由簇头在数据聚合之前完成,如果接收到的数据无效,则丢弃接收到的数据。只有经过验证的数据才会在簇头进行聚合。采用同态加密方法进行加密,加密后的信息发送到簇头,由基站(BS)进行信息解密,实现端到端安全。提出了一种基于ID的逐跳认证技术。在本文中,我们提出了恢复由于缓冲区溢出而丢失的数据的方法。在给定的系统中,缓存存储器由簇头提供,用于恢复数据丢失。最后的测试结果表明,根据Jung模拟器上的时间和能耗等参数,所提出的系统与现有系统相比是良好的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
H-WSN with maximized QoS using secure data aggregation
To perform some operation there is a need of some amount of energy over the node is same to the sending the single bit of data in the network. Data transportation reduces the network lifetime when sending data in sensor network. So the need to reduce the energy consumption for improving the network lifetime. As cluster head is aggregator node of the cluster it can take part in communication many times while communication is going on in the cluster members. That's the reason that the energy utilization of the cluster head is high as compared with the cluster members present in the cluster. The present system has a way to choose the cluster head unplanned due to its high level of energy consumption. To answer this problem we introduced a system represents a technique in that effective cluster head is chosen based on the distance from the base station as well as remaining energy. After selecting the cluster head, it makes use of minor amount of energy of sensor network as well as helps to improve the lifetime of the network of sensor network. Aggregation of the data received from the cluster members is duty of cluster head in the cluster. Verification of data is done by the cluster head prior to the data aggregation if data received is not valid then received data is discarded. Only verified data is taken for aggregation at cluster head. Encryption is done by making use of homomorphic encryption method as well as encrypted information send to the cluster head and information decryption is performed by base station (BS) for giving end to end security. An ID based signature technique is developed for hop by hop authentication. In this paper, we present the method for recovering the data which is lost due to the buffer overflow. In given system cache memory is provided by the cluster head for recovery of data loss. At last test results shows depending on parameter like time as well as energy consumption on Jung simulator that system presented is good compared to the available system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信