Design and Analysis of Secure Data Aggregation Technique using IF algorithm

  • Unique Paper ID: 144040
  • PageNo: 197-201
  • Abstract:
  • As now we have limited power resources and computational power, data aggregation from multiple sensor nodesis done using easy methods similar to averaging. WSN’s are more commonly unattended, they are particularly vulnerable to nodecompromising attacks. Consequently making it critical to ascertain trustworthiness of data and repute of sensor nodes iscritical for WSN. The aggregation of data from multiple sensor nodes is done at the aggregating node, by way of simple process comparable to averaging. Nevertheless such aggregation is known to be totally susceptible to node compromising assaults.Traditionally, WSNs are totally inclined to such attacks because of absences of tamper resistant hardware. Iterative Filtering process concurrently combination data from a couple of sources, typically in a form of corresponding weight reasons. Iterative Filtering is introduced which are extra effective towards collusion attacks than the easy averaging approaches.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144040,
        author = {PRAVALLIKA MADD and M.OMPRAKASH},
        title = {Design and Analysis of Secure Data Aggregation Technique using IF algorithm},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {5},
        pages = {197-201},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144040},
        abstract = {As now we have limited power resources and computational power, data aggregation from multiple sensor nodesis done using easy methods similar to averaging. WSN’s are more commonly unattended, they are particularly vulnerable to nodecompromising attacks. Consequently making it critical to ascertain trustworthiness of data and repute of sensor nodes iscritical for WSN. The aggregation of data from multiple sensor nodes is done at the aggregating node, by way of simple process comparable to averaging. Nevertheless such aggregation is known to be totally susceptible to node compromising assaults.Traditionally, WSNs are totally inclined to such attacks because of absences of tamper resistant hardware. Iterative Filtering process concurrently combination data from a couple of sources, typically in a form of corresponding weight reasons. Iterative Filtering is introduced which are extra effective towards collusion attacks than the easy averaging approaches.},
        keywords = {Collusion Attacks,data aggregation,Iterative Filtering Algorithm,wireless sensor network.},
        month = {},
        }

Cite This Article

MADD, P., & M.OMPRAKASH, (). Design and Analysis of Secure Data Aggregation Technique using IF algorithm. International Journal of Innovative Research in Technology (IJIRT), 3(5), 197–201.

Related Articles