In several sensor functions, the data assembled from personage nodes is cumulative at a base station or host PC. To reduce energy exploitation, plentiful supports furthermore execute in-network aggregation of sensor data at transitional nodes reroute to the base station. The largest part accessible aggregation estimates and supports do prohibit any arrangements for security, and thusly these supports are powerless aligned with an extensive assortment of attacks. Exclusively, bargained nodes may be utilized to impart copied data that punctual inaccurate entire’s being registered at the base station. We speak concerning the security vulnerabilities of data aggregation supports, and bring a study of powerful and secure aggregation protocols that are stretchy to false data concoction attacks.
CITATION STYLE
Selvi, M., & Joe Prathap, P. M. (2019). Analysis & classification of secure data aggregation in wireless sensor networks. International Journal of Engineering and Advanced Technology, 8(4), 1404–1407.
Mendeley helps you to discover research relevant for your work.