As now we have limited power resources and computational power, data aggregation from multiple sensor nodesis done using easy methods similar to averaging. WSN’s are more commonly unattended, they are particularly vulnerable to nodecompromising attacks. Consequently making it critical to ascertain trustworthiness of data and repute of sensor nodes iscritical for WSN. The aggregation of data from multiple sensor nodes is done at the aggregating node, by way of simple process comparable to averaging. Nevertheless such aggregation is known to be totally susceptible to node compromising assaults.Traditionally, WSNs are totally inclined to such attacks because of absences of tamper resistant hardware. Iterative Filtering process concurrently combination data from a couple of sources, typically in a form of corresponding weight reasons. Iterative Filtering is introduced which are extra effective towards collusion attacks than the easy averaging approaches.
Article Details
Unique Paper ID: 144040
Publication Volume & Issue: Volume 3, Issue 5
Page(s): 197 - 201
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024