z-logo
open-access-imgOpen Access
Two phase secure data collection technique for wireless sensor networks
Author(s) -
Gousia Thahniyath,
Priti Mishra,
Sundar Raj Moorthy
Publication year - 2022
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v26.i1.pp512-520
Subject(s) - wireless sensor network , computer network , computer science , node (physics) , overhead (engineering) , key distribution in wireless sensor networks , data collection , confidentiality , sensor node , data aggregator , wireless , wireless network , computer security , engineering , telecommunications , statistics , mathematics , structural engineering , operating system
Wireless  sensor networks (WSNs) are the sensors that are dispersed in a different location that can sense the accumulated data in real-time and send it to the central location for the process of data aggregation. During the transfer of the information using the data nodes from the WSNs to the central location, there may be chances that the data node could be compromised by sensor failure or by an attack from a malicious user. To overcome this problem, we propose a two-phase secure data collection (TPSDC) technique for wireless sensor networks which provides confidentiality and integrity for the data nodes that are being sent to the central location and also during the data aggregation in the central location. Various existing methods have been proposed to secure the data when sent from the WSNs to the internet of things (IoT) devices but they lack to provide both confidentiality and integrity at the same time. Hence our model provides both integrity and confidentiality by providing security to the data nodes. Experimental results show that our model TPSDC performs better in terms of misclassification rate, detection rate, throughput, network lifetime analysis of the node, and communication overhead of the node when compared with the existing methods.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here