Design and Analysis of Secure Data Aggregation Technique using IF algorithm
Author(s):
PRAVALLIKA MADD, M.OMPRAKASH
Keywords:
Collusion Attacks,data aggregation,Iterative Filtering Algorithm,wireless sensor network.
Abstract
As now we have limited power resources and computational power, data aggregation from multiple sensor nodesis done using easy methods similar to averaging. WSN’s are more commonly unattended, they are particularly vulnerable to nodecompromising attacks. Consequently making it critical to ascertain trustworthiness of data and repute of sensor nodes iscritical for WSN. The aggregation of data from multiple sensor nodes is done at the aggregating node, by way of simple process comparable to averaging. Nevertheless such aggregation is known to be totally susceptible to node compromising assaults.Traditionally, WSNs are totally inclined to such attacks because of absences of tamper resistant hardware. Iterative Filtering process concurrently combination data from a couple of sources, typically in a form of corresponding weight reasons. Iterative Filtering is introduced which are extra effective towards collusion attacks than the easy averaging approaches.
Article Details
Unique Paper ID: 144040

Publication Volume & Issue: Volume 3, Issue 5

Page(s): 197 - 201
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews