International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 167 - Issue 7 |
Published: Jun 2017 |
Authors: E. G. Prathima, Shiv Prakash T., Venugopal K. R., S. S. Iyengar, L. M. Patnaik |
![]() |
E. G. Prathima, Shiv Prakash T., Venugopal K. R., S. S. Iyengar, L. M. Patnaik . ADA: Authenticated Data Aggregation in Wireless Sensor Networks. International Journal of Computer Applications. 167, 7 (Jun 2017), 29-36. DOI=10.5120/ijca2017914309
@article{ 10.5120/ijca2017914309, author = { E. G. Prathima,Shiv Prakash T.,Venugopal K. R.,S. S. Iyengar,L. M. Patnaik }, title = { ADA: Authenticated Data Aggregation in Wireless Sensor Networks }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 167 }, number = { 7 }, pages = { 29-36 }, doi = { 10.5120/ijca2017914309 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A E. G. Prathima %A Shiv Prakash T. %A Venugopal K. R. %A S. S. Iyengar %A L. M. Patnaik %T ADA: Authenticated Data Aggregation in Wireless Sensor Networks%T %J International Journal of Computer Applications %V 167 %N 7 %P 29-36 %R 10.5120/ijca2017914309 %I Foundation of Computer Science (FCS), NY, USA
Wireless Sensor Networks are vulnerable to communication failures and security attacks. It is quite challenging to provide security to data aggregation. This paper proposes Authenticated Data Aggregation for Wireless Sensor Networks, where the nodes organize themselves into tiers around the sink. Message Authentication Code (MAC) is generated and transmitted along with the synopsis to ensure integrity. All nodes in the network store the same key that is used for rekeying operation during each round to generate MAC. Thus ADA ensures data freshness and integrity at a communication cost of O(1). Simulation results show that the proposed ADA protocol results in high security, low energy consumption and low communication cost compared to the state-of-the art protocol.