Abstract
Directed diffusion is a data dissemination protocol for wireless sensor networks. In directed diffusion, interest and exploratory data are disseminated by flooding, which will bring broadcast storm resulting in substantial energy consumption of networks. Grid-based directed diffusion can improve the energy efficiency where geographic grids are constructed by self-organization of nodes using location information. The flooding of interest and exploratory data is limited in grid head nodes. To save more energy, a scheme of data aggregation based on wavelet sparseness is proposed. At the same time, to adapt to environments with high security requirements, secure schemes based on trust are added. The simulation experiments show that the proposed data aggregation scheme can obtain data aggregation results earlier and effectively extend lifetime of network. And experiments show that the proposed security schemes restrain malicious nodes when network is under attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion for wireless sensor networking. IEEE Trans. Netw. 11, 2–16 (2003)
Jiana, B., Zhenzhou, J., Zhiyan, C.: Grid-based directed diffusion for wireless sensor networks. High Technol. Lett. 14, 342–347 (2008)
Tian, B., He, M.: A self-healing key distribution scheme with novel properties. Int. J. Netw. Secur. 7, 115–120 (2008)
Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2, 313–332 (2006)
Doumit, S., Agrawal, D.P.: Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. In: IEEE Military Communications Conferences, Boston, USA, pp. 609–614 (2002)
Rajasegarar, S., Leckie, C., Palaniswami, M., Bezdek, J.C.: Distributed anomaly detection in wireless sensor networks. In: 10th IEEE Singapore International Conference of Communication System, Singapore, pp. 1–5 (2006)
Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: 3rd IEEE International Symposium on Network Computing and Application, Cambridge, USA, pp. 343–346 (2004)
Hur, J., Lee, Y., Hong, S.M., Yoon, H.: Trust-based secure aggregation in wireless sensor networks. In: 3rd International Conference on Computing, Communications and Control Technologies, Austin, USA, pp. 491–496 (2005)
Crovella, M., Kolaczyk, E.: Graph wavelets for spatial traffic analysis. In: 22nd IEEE INFOCOM, San Francisco, USA, pp. 1848–1857 (2003)
Zhang, W., Das, S.K., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: 3rd Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Reston, USA, pp. 60–69 (2006)
Acknowledgement
This work was supported by the National Natural Science Foundation of China under grant 61602056, the Doctoral Scientific Research Foundation of Liaoning Province under grant 201601348, and the Scientific Research Project of Liaoning Provincial Committee of Education under grant LZ2016005.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bi, J., Leng, Q. (2018). A Secure and Energy-Efficient Data Aggregation Protocol Based on Wavelet. In: Yuan, H., Geng, J., Liu, C., Bian, F., Surapunt, T. (eds) Geo-Spatial Knowledge and Intelligence. GSKI 2017. Communications in Computer and Information Science, vol 848. Springer, Singapore. https://doi.org/10.1007/978-981-13-0893-2_39
Download citation
DOI: https://doi.org/10.1007/978-981-13-0893-2_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0892-5
Online ISBN: 978-981-13-0893-2
eBook Packages: Computer ScienceComputer Science (R0)