z-logo
open-access-imgOpen Access
Detecting malicious nodes using data aggregation protocols in wireless sensor networks
Author(s) -
P. Balamurugan,
M. Shyamala Devi,
V. Ceronmani Sharmila
Publication year - 2017
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i1.1.10365
Subject(s) - data aggregator , wireless sensor network , computer science , data redundancy , computer network , energy consumption , data transmission , redundancy (engineering) , base station , key distribution in wireless sensor networks , node (physics) , data collection , sensor node , wireless , wireless network , telecommunications , engineering , database , statistics , mathematics , structural engineering , electrical engineering , operating system
At present scenario, sensor devices are used in various fields for gathering information so all those data should be secured safely. Securing data is an important role in Wireless Sensor Networks (WSN). WSN is extremely essential for the purpose of reducing the complete redundancy and energy consumption during gathering data among sensor nodes. Optimized data aggregation is needed at cluster head and Base Station (BS) for secured data transmission. Data aggregation is performed in all routers while forwarding data from source to destination node. The complete life time of sensor networks is reducing because of using energy inefficient nodes for the purpose of aggregation. So this paper introduces the optimized methods for securing data (OMSD) which is trust based weights and also completely about the attacks and some methods for secured data transmission. 

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here