Analysis & classification of secure data aggregation in wireless sensor networks

ISSN: 22498958
12Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

In several sensor functions, the data assembled from personage nodes is cumulative at a base station or host PC. To reduce energy exploitation, plentiful supports furthermore execute in-network aggregation of sensor data at transitional nodes reroute to the base station. The largest part accessible aggregation estimates and supports do prohibit any arrangements for security, and thusly these supports are powerless aligned with an extensive assortment of attacks. Exclusively, bargained nodes may be utilized to impart copied data that punctual inaccurate entire’s being registered at the base station. We speak concerning the security vulnerabilities of data aggregation supports, and bring a study of powerful and secure aggregation protocols that are stretchy to false data concoction attacks.

Cite

CITATION STYLE

APA

Selvi, M., & Joe Prathap, P. M. (2019). Analysis & classification of secure data aggregation in wireless sensor networks. International Journal of Engineering and Advanced Technology, 8(4), 1404–1407.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free