Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{144040,
author = {PRAVALLIKA MADD and M.OMPRAKASH},
title = {Design and Analysis of Secure Data Aggregation Technique using IF algorithm},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {3},
number = {5},
pages = {197-201},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=144040},
abstract = {As now we have limited power resources and computational power, data aggregation from multiple sensor nodesis done using easy methods similar to averaging. WSN’s are more commonly unattended, they are particularly vulnerable to nodecompromising attacks. Consequently making it critical to ascertain trustworthiness of data and repute of sensor nodes iscritical for WSN. The aggregation of data from multiple sensor nodes is done at the aggregating node, by way of simple process comparable to averaging. Nevertheless such aggregation is known to be totally susceptible to node compromising assaults.Traditionally, WSNs are totally inclined to such attacks because of absences of tamper resistant hardware. Iterative Filtering process concurrently combination data from a couple of sources, typically in a form of corresponding weight reasons. Iterative Filtering is introduced which are extra effective towards collusion attacks than the easy averaging approaches.},
keywords = {Collusion Attacks,data aggregation,Iterative Filtering Algorithm,wireless sensor network.},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry