To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
1. GLOBALSOFT TECHNOLOGIES
Secure Continuous Aggregation in Wireless Sensor Networks
Continuous aggregation is usually required in many sensor applications to obtain the temporal
variation information of aggregates. However, in a hostile environment, the adversary could
fabricate false temporal variation patterns of the aggregates by manipulating a series of
aggregation results through compromised nodes. Existing secure aggregation schemes conduct
one individual verification for each aggregation result, which could incur great accumulative
communication cost and negative impact on transmission scheduling for continuous aggregation.
In this paper, we identify distinct design issues for protecting continuous in-network aggregation
and propose a novel scheme to detect false temporal variation patterns. Compared with the
existing schemes, our scheme greatly reduces the verification cost by checking only a small part
of aggregation results to verify the correctness of the temporal variation patterns in a time
window. A sampling-based approach is used to check the aggregation results, which enables our
scheme independent of any particular in-network aggregation protocols as opposed to existing
schemes. We also propose a series of security mechanisms to protect the sampling process. Both
theoretical analysis and simulations show the effectiveness and efficiency of our scheme.
Existing System
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com
2. Continuous aggregation is usually required in many sensor applications to obtain the temporal
variation information of aggregates. However, in a hostile environment, the adversary could
fabricate false temporal variation patterns of the aggregates by manipulating a series of
aggregation results through compromised nodes. Existing secure aggregation schemes conduct
one individual verification for each aggregation result, which could incur great accumulative
communication cost and negative impact on transmission scheduling for continuous aggregation.
Proposed System
In this paper, we identify distinct design issues for protecting continuous in-network aggregation
and propose a novel scheme to detect false temporal variation patterns. Compared with the
existing schemes, our scheme greatly reduces the verification cost by checking only a small part
of aggregation results to verify the correctness of the temporal variation patterns in a time
window. A sampling-based approach is used to check the aggregation results, which enables our
scheme independent of any particular in-network aggregation protocols as opposed to existing
schemes. We also propose a series of security mechanisms to protect the sampling process. Both
theoretical analysis and simulations show the effectiveness and efficiency of our scheme.
System Specification
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 14’ Colour Monitor.
• Mouse : Optical Mouse.
• Ram : 512 Mb.
3. Software Requirements:
• Operating system : Windows 7.
• Coding Language : ASP.Net with C#
• Data Base : SQL Server 2008.