Академический Документы
Профессиональный Документы
Культура Документы
PROBLEM DEFINITION
In wireless sensor network , data transferring from one node to another node there may be chances of arising some unwanted data Existing technique if unwanted data is found the aggregator forwards the data to the other nodes and dont allow any changes on the data by aggregator
Problem solution
Data aggregation and authentication protocol By using this the data can be forwarded with authentication
DAA
Data aggregation and authentication it reduces data redundancy it provides data accuracy it improves the life time of battery it improves the utilization of bandwidth
PROCESS FLOW
CREATION OF NODES
CREATION OF NETORK
SELECTION OF AGGREGATOR
Creation of nodes
Creating sensor nodes randomly and assigning id to every node Let us consider no of nodes as n= 16
ID
x-axis
Y-axis
z-axis
KEYS
1 2 3 4 5
6 3 16 11 7
16 6 14 12 1
80 20 30 130 10
7 6 12 14 3
6
7 8 9 10 11 12 13 14
14
8 5 15 1 2 4 13 9
13
5 9 15 11 10 3 7 2
60
100 90 150 140 160 50 110 120
10
8 15 11 5 4 16 1 13
15
16
10
12
8
4
40
70
2
9
Creation of network
Connection is established between every node Calculating distance between each node Ex: 0 10 10 6 15 9 11 7 9 7 7 13 10 0 15 10 6 13 5 4 15 5 4 3
ID
x-axis
Y-axis
z-axis
KEYS
DISTANCE
1 2 3 4
6 3 16 11
16 6 14 12
80 20 30 130
7 6 12 14
0 10 10 6
5
6 7 8 9 10 11 12 13 14 15 16
7
14 8 5 15 1 2 4 13 9 10 12
1
13 5 9 15 11 10 3 7 2 8 4
10
60 100 90 150 140 160 50 110 120 40 70
3
10 8 15 11 5 4 16 1 13 2 9
15
9 11 7 9 7 7 13 11 14 9 13
Selection of aggregator
In this case each node can act as aggregator To be act as current aggregator It should contain backward and forward aggregator
Aggregator table
ID
x-axis
Y-axis
z-axis
KEYS
DISTANCE
GROUPS
GROUP NO
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
6 3 16 11 7 14 8 5 15 1 2 4 13 9 10 12
16 6 14 12 1 13 5 9 15 11 10 3 7 2 8 4
7 6 12 14 3 10 8 15 11 5 4 16 1 13 2 9
0 10 10 6 15 9 11 7 9 7 7 13 11 14 9 13
0 6 7 7 7 9 9 9 10 10 11 11 13 13 14 15 G3 G3 G3 G3 G2 G2 G2 G2 G1 G1 G1 G1
Generation of MACs
data aggregators are allowed to encrypt and decrypt the aggregated data.
The forwarding nodes first verify data integrity using MACs and then relay the data if it is not false.
An FMAC consists of small-size MACs, called subMACs, such that one of them is computed by a data aggregator and the remaining subMACs are computed by its monitoring nodes. sensor node has the same pseudo-random number generator (PRNG) that generates random numbers ranging from 1 to 32. After the pairs are formed and their shared keys are established, the sensor nodes of each pair initiate their PRNGs using their shared key as the seed.
By using random key distribution protocols, monitoring nodes can ensure the identity of their pairmates, there by preventing Sybil attacks where a compromised node fakes multiple identities to establish pair relations with more than one monitoring node.
The monitor node of current aggregator should link with any node that act as forwading node The monitor node of current aggregator can link with any neighbor node of forward aggregator
Ltos length of data packet Hd= data aggregator ---data packet generate by legitimate node ---unwanted data packet injected by T compromised node H =21 and Ltos =41 the results are obtained
SCOPE OF PROJECT
Reduction of partial unwanted data using DAA protocol Reducing the no of monitoring nodes Computation should be fast