Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145609,
author = {U.Jayasree and K.Reddamma},
title = {Consistent and Protected End-to-End Data Aggregation Using Sceret Distribution in WSNs},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {10},
pages = {617-621},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=145609},
abstract = {Data aggregation in WSNs (Wireless sensor Networks) can effectively reduce communication overheads and therefore the energy consumption of detector nodes. A WSN must be not solely energy economical, however conjointly secure. Varied attacks could build data aggregation unsecure. We investigate the reliable and secure end to-end data aggregation downside considering selective forwarding attacks and modification attacks in homogenous cluster-based WSNs, and propose two data aggregation approaches. Our approaches, namely, Sign-Share and Sham-Share, use secret sharing and signatures to permit aggregators to combination the data while not understanding the contents of messages and therefore the base station to verify the collective data and retrieve the raw data from the collective data.},
keywords = {data aggregation , wireless sensorNetworks, sign-shared and sham-share},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry