An Exploratory Survey of Data Aggregation Techniques in Wireless Sensor Networks

  • Unique Paper ID: 150180
  • PageNo: 1-8
  • Abstract:
  • In remote sensor networks (WSN),make sure about accumulation of messages is the greatest fundamental capacity in keeping off dangers from un wanted , un approved and degenerate messages from being sent. There are a few message confirmation and validation strategies have been proposed not withstanding propels dependent on cryptography age including symmetric key cryptographic structures or open key cryptographic structures. Additionally there are various procedures accessible fundamentally dependent on polynomial-plans, elliptic bend cryptography . The entirety of the above expressed procedures have its own merits and bad marks. The determination of data total methodology relies upon the utility necessities notwithstanding the relative force reserve funds obtained by method of utilizing this procedure. As various sensor hubs routinely identify basic marvels, there might be a couple of repetition in the records. In the interim numerous bundles establishment additional sensors than the exact prerequisite with an end goal to fittingly feel the objective phenomena.[1]

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{150180,
        author = {N.Shantha kumar and Dr.Hareesh K},
        title = {An Exploratory Survey of Data Aggregation Techniques in Wireless Sensor Networks},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {7},
        number = {4},
        pages = {1-8},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=150180},
        abstract = {In remote sensor networks (WSN),make sure about accumulation of messages is the greatest fundamental capacity in keeping off dangers from un wanted , un approved and degenerate messages from being sent. There are a few message confirmation and validation strategies have been proposed not withstanding propels dependent on cryptography age including symmetric key cryptographic structures or open key cryptographic structures. Additionally there are various procedures accessible fundamentally dependent on polynomial-plans, elliptic bend cryptography . The entirety of the above expressed procedures have its own merits and bad marks. The determination of data total methodology relies upon the utility necessities notwithstanding the relative force reserve funds obtained by method of utilizing this procedure. As various sensor hubs routinely identify basic marvels, there might be a couple of repetition in the records. In the interim numerous bundles establishment additional sensors than the exact prerequisite with an end goal to fittingly feel the objective phenomena.[1]},
        keywords = {Data Aggregation, Wireless Sensor Networks(WSN), Cryptography ,Data encryption standard (DES) ,Advanced encryption principles (AES), ,Encryption, figure text ,Decryption.},
        month = {},
        }

Cite This Article

kumar, N., & K, D. (). An Exploratory Survey of Data Aggregation Techniques in Wireless Sensor Networks. International Journal of Innovative Research in Technology (IJIRT), 7(4), 1–8.

Related Articles