CFP last date
20 May 2024
Reseach Article

Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting

by M.Umashankar, C.Chandrasekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 4
Year of Publication: 2010
Authors: M.Umashankar, C.Chandrasekar
10.5120/96-205

M.Umashankar, C.Chandrasekar . Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting. International Journal of Computer Applications. 1, 4 ( February 2010), 75-80. DOI=10.5120/96-205

@article{ 10.5120/96-205,
author = { M.Umashankar, C.Chandrasekar },
title = { Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 4 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 75-80 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number4/96-205/ },
doi = { 10.5120/96-205 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:44:15.374582+05:30
%A M.Umashankar
%A C.Chandrasekar
%T Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 4
%P 75-80
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is a very important issue when designing or deploying any network or protocol. The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. One or several sensors then collect the detection results from other sensors. The collected data must be processed by the sensor to reduce the transmission burden before they are transmitted to the base station. This process is called data fusion. Data fusion Nodes will fuses the collected data from nearby sensor nodes before they are sent to the base station. If a fusion node is compromised, then the base station cannot ensure the correctness of the fusion data sent to it. Various methods are proposed, that deal with providing an assured data transfer to the Base Station.

References
  1. . "Ns-2 network simulator," http://www.isi.edu/nsnam/ns/, 1998.
  2. . "CMU Monarch extensions to ns-2," http://www.monarch.cs.cmu.edu/cmu-ns.html, 1999., 1999.
  3. . Marc Greis' Tutorial for the UCB/LBNL/VINT Network Simulator "ns"
  4. . Hung-Ta Pai and Yunghsiang S. Han , July 2006 , Power-Efficient Data fusion Assurance Using Direct Voting Mechanism in Wireless Sensor Networks, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06) .
  5. . W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Networks. In Proc. GLOBECOM 2003, volume 3, pages 1435–1439, San Francisco, CA, Dec. 2003.
  6. . A.Sinha and A.Chandrasekar, Dynamic , Power management in wireless sensor network, IEEE Design and test of Computer” pp 62-74 march-April 2001.
  7. . I.F.Akyildiz, W.Su, Y.Sankarasubramanian , E.Cayirai, A Survey an sensor network , IEEE Commun, May 40(8)(2002).
  8. . Suat ozdemir, Yanaxiao, Secure data aggregation in wireless sensor networks ; A Comprehensive overview , Elsevier Computer Networks 53 (2009) 2022-2037.
  9. . S.A.Aldosai and J.M.F.Moura, Detection in Decentralized Sensor Networks, Proc Intil Conf. Acoustics, Speech, and signal processing, pp. 277-280 may 2004.
  10. . Hung-Ta pai, and Yunghsiang S.han, Power-Efficient Direct-voting Assurance for Data Fusion in Wireless Sensor Networks, IEEE Transaction on Computer Vol 57 No 2 Feb 2008.
  11. . R.Andersan and M.Kuhn, Tamper Resistance – A Cautionary Note , Proc. Second usenix workshop Electraonic Commerce, pp 1-11, nov 1996.
  12. . Bartosz Przydatek, Dawn Song, Adrian Perrig, SIA : Secure Information aggregation in Sensor Networks, Journal of Computer Society Vol 15 Issue 1 January 2007 special issue on security of Ad-hoc and Sensor networks pp 69-102, January 2007.
  13. . C.Intanagonwiwat, D Estrin, R.Govindan, and J.Heidemann. Impact of network density on data aggregation in wireless sensor networks. In Proc International conference on Distributed Computing Systems, November 2001.
  14. . Wei Yuan, Srikanth V.Krishnamurthy, and Satish K. Tripathi, Synchronization of Multiple Levels of Data Fusion in Wireless Sensor Networks, Proc IEEE Global Telecommunication conference, 2003 GlobeCom’03 vol 1 pp 221-225.
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Network Data Fusion Fusion Assurance Security