@article {10.3844/jcssp.2012.232.238, article_type = {journal}, title = {Secure Authentication Technique for Data Aggregation in Wireless Sensor Networks}, author = {Bhoopathy, V. and Parvathi, R. M.S.}, volume = {8}, number = {2}, year = {2012}, month = {Jan}, pages = {232-238}, doi = {10.3844/jcssp.2012.232.238}, url = {https://thescipub.com/abstract/jcssp.2012.232.238}, abstract = {Problem statement: In Wireless Sensor Networks (WSN), serious security threat is caused by node capture attacks where an adversary gains full control over a sensor node through direct physical access. Approach: This creates a high risk of data confidentiality. Results: We propose a secure authentication technique for data aggregation in WSN. During first round of data aggregation, the aggregator upon identifying the detecting nodes selects a set of nodes randomly and broadcast a unique value which contains their authentication keys, to the selected set of nodes. When any node within the set wants to send the data, it sends slices of data to other nodes in that set, encrypted with their respective authentication keys. Each receiving node decrypts, sums up the slices and sends the encrypted data to the aggregator. Conclusion/Recommendations: The aggregator aggregates and encrypts the data with the shared secret key of the sink and forwards it to the sink. In the second round of aggregation, the set of nodes is reselected with new set of authentication keys. By simulation results, we show that the proposed approach rectifies the security threat of node capture attacks.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }