Secure Data Aggregation with False Temporal Pattern Identification for Wireless Sensor Networks
T. Abirami1, M. Meenalochini2, S. Anandamurugan3
1Dr. T. Abirami, Assistant Professor, Department of Engineering College, Perundurai, (Tamil Nadu), India.
2M. Meenalochini, PG Scholar, Department of Engineering College, Perundurai, (Tamil Nadu), India.
3Dr. S. Anandamurugan, Assistant Professor, Department of Engineering College, Perundurai, (Tamil Nadu), India.
Manuscript received on November 21, 2014. | Revised Manuscript received on December 05, 2014. | Manuscript published on December 30, 2014. | PP: 195-197 | Volume-4 Issue-2, December 2014. | Retrieval Number:  B3667124214/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time and track real time measurements for trend analysis. In the continuous aggregation, the attacker could manipulate a series of aggregation results through compromised nodes to fabricate false temporal variation patterns of the aggregates. Existing secure aggregation schemes conduct one individual verification for each aggregation result. Due to the high frequency and the long period of a continuous aggregation in every epoch, the false temporal variation pattern would incur a great communication cost. In this paper, we detect and verify a false temporal variations pattern by checking only a small part of aggregation results to reduce a verification cost. A sampling based approach is used to check the aggregation results and we also proposed a security mechanism to protect the sampling process.
Keywords: Data aggregation, Sampling, Wireless Sensor Networks.