CINXE.COM

TY - JFULL AU - M. Abbasi Dezfouli and S. Mazraeh and M. H. Yektaie PY - 2011/1/ TI - The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study T2 - International Journal of Information and Communication Engineering SP - 1732 EP - 1741 VL - 5 SN - 1307-6892 UR - https://publications.waset.org/pdf/2249 PU - World Academy of Science, Engineering and Technology NX - Open Science Index 60, 2011 N2 - Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol. ER -