Browsing by Author "R, Divya"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item EFFICIENT AND SECURE CONCEALED DATA AGGREGATION FOR MULTIPLE APPLICATIONS (CDAMA) IN WIRELESS SENSOR NETWORKS(International Journal of Computer Engineering and Applications, 2014-08) K, Geethalakshmi; R, DivyaA wireless sensor network is a collection of nodes into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. The limitations of nodes involve power consumption, computation as well as communication capability. Many data aggregation schemes were proposed on the basis of Privacy Homomorphism (PH). PH allows direct computation on encrypted data. However, all these schemes do not support multi-application environments. CDAMA (Concealed Data Aggregation for Multiple Applications) is one such algorithm that is based on PH and supports multi-application environments. CDAMA helps in reducing transmission overhead as well as it provides better security.Item HIERARCHICAL ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK(PSGR Krishnammal College for Women, 2015-01-29) K, Geethalakshmi; R, DivyaA wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In the wireless sensor networks, routing protocols and data aggregation schemes are used to reduce the large amount of transmissions. In the wireless sensor network, security is an important concern. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.Item PRIVACY RISK IN RECOMMENDED SYSTEM(PSGR Krishnammal College for Women, 2014-01-09) K, Geethalakshmi; R, DivyaIn many on-line applications, the range of content that is offered to users is so wide that a requirement for automatic recommender systems arises. Such systems will give a personalized selection of relevant things to users. In practice, this may facilitate people realize fun movies, boost sales through targeted advertisements, or facilitate social network users meet new friends. To produce correct personalized recommendations, recommender systems depend on detailed personal information on the preferences of users. Ratings, consumption histories and personal profiles are examples. Recommender systems are useful, but the privacy risks associated in aggregation and process personal information are typically underestimated or neglected. Many users are not sufficiently aware if and the way a lot of their information is collected, if such information is sold-out to third parties or how securely it is saved and for how long. This paper aims to provide insight into privacy in recommender systems. First, we shall discuss different varieties of existing recommender systems. Second, an overview of the data that is employed in recommender systems is given. Third, I analyze the associated risks to information privacy. Finally, relevant research areas for privacy-protection techniques and their relevancy to recommender systems are mentioned.Item TRUST COMPUTATION MODEL FOR SECURE DATA AGGREGATION (TCMSDA) IN WIRELESS SENSOR NETWORKS(International Journal of Computer Science Engineering and Technology( IJCSET), 2014-11) K, Geethalakshmi; R, DivyaA wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In the wireless sensor networks, data aggregation scheme is used to reduce the large amount of transmissions. In the wireless sensor network, security is an important concern. So, in order to overcome this problem a new concealed data aggregation scheme is used. It has three contributions: First, it is designed for a multi-application environment. The base station extracts application-specific data from aggregated cipher texts. Next, it mitigates the impact of compromising attacks in single application environments. Finally, it degrades the damage from unauthorized aggregations. In this method, the aggregator is selected based on the transmission range. But the drawback is less security and less efficient. So, in this paper, an innovative technique called Trust Computation Model for Secure Data Aggregation (TCMSDA) in wireless sensor networks is introduced. A new trust management scheme is essential to differentiate illegal and normal nodes and filter out the malicious nodes in the network. In the trust computation model, each node identifies trustworthiness of sensor nodes. This model suggests a defensible approach against insider attacks incipiently beyond standard authentication mechanisms and conventional key management schemes. Experimental results show that when compared to the existing system, the proposed system achieves more efficiency and high security.