Вы находитесь на странице: 1из 26

REDUCTION OF PARTIAL UNWANTED DATA USING DAA PROTOCOL IN WSN

under the guidance of Mr. A. MallaReddy Asst.Professor. Dept. of ECE

by Vijay kumar Mendu 09621D6123 M.Tech (Communication Systems)

PROBLEM DEFINITION
In wireless sensor network , data transferring from one node to another node there may be chances of arising some unwanted data Existing technique if unwanted data is found the aggregator forwards the data to the other nodes and dont allow any changes on the data by aggregator

Problem solution
Data aggregation and authentication protocol By using this the data can be forwarded with authentication

DAA
Data aggregation and authentication it reduces data redundancy it provides data accuracy it improves the life time of battery it improves the utilization of bandwidth

SENSOR NODE DEPLOYMENT

DATA AGGREGATION BETWEEN SENSOR NODES

Figure: Data transfer between node and base station

DAA REQUIRES 3 STEPS


Monitor node selection Forming pair of nodes Integrity of security and reduction of unwanted data

Process flow

Creation of nodes
Creating sensor nodes randomly and assigning id to every node

Creation of network Connection is established between every node Calculating distance between each node Ex: 0 7 9 6 9 7 1 9 7 6 4 7 7 0 16 13 11 14 5 15 11 10 3 12 9 16 0 4 13 3 11 6 10 10 13 7 6 13 4 0 13 1 7 9 6 5 9 8

Monitor node selection

Monitor node selection process

Monitor node selection


Monitor nodes are selected from neighbor nodes for data verification We have to assign some indices to neighbor nodes to act as monitor nodes Data aggregator requests the neighbor node to send its random numbers using PRNG and key it shares with data aggregator When data aggregator receives random no's and node IDs and it give labeling to it All random numbers are sort in ascending order and computes MAC for random numbers and broadcast to the neighbor nodes Each node verifies the broadcast no's by checking whether two random no's it sent earlier match two random numbers hence verification is successful else sit sends the request.

To determine indices for monitoring nodes we use the formula as below

General architecture used by DAA

Forming pair of nodes

The monitor node of current aggregator should link with any node that act as forwading node The monitor node of current aggregator can link with any neighbor node of forward aggregator

Integration of secure DA and false data detection

Simulations are performed using DDAA and Dtradauth equations.

Ltos length of data packet Hd= data aggregator ---data packet generate by legitimate node ---unwanted data packet injected by T compromised node H =21 and Ltos =41 the results are obtained

7000 6000

Data transmission

5000 4000 3000 2000 2.5 2 1 Hd 1.5 0.5 False data/legimate data

1.5

3200

Total data transmission(bytes)

3000 2800 2600 2400 2200 12 10 8 6 Hd 4 0 1 0.5 False data/legimate data 1.5 2

3000

Total data transmission(bytes)

2500

2000

1500

1000 12 10 8 6 Hd 4 0 1 0.5 False data/legimate data 1.5 2

SCOPE OF PROJECT
Reduction of partial unwanted data using DAA protocol Reducing the no of monitoring nodes Computation should be fast

Вам также может понравиться