Analysis & Classification of Secure Data Aggregation in Wireless Sensor Networks
M Selvi1, P M Joe Prathap2
1M Selvi, Research Scholar, Sathyabama Institute of Science and Technology, Chennai (Tamil Nadu), India.
2P M Joe Prathap, Associate Professor, Department of Information Technology, RMD Engineering College, Chennai (Tamil Nadu), India.
Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 1404-1407 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6822048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In several sensor functions, the data assembled from personage nodes is cumulative at a base station or host PC. To reduce energy exploitation, plentiful supports furthermore execute in-network aggregation of sensor data at transitional nodes reroute to the base station. The largest part accessible aggregation estimates and supports do prohibit any arrangements for security, and thusly these supports are powerless aligned with an extensive assortment of attacks. Exclusively, bargained nodes may be utilized to impart copied data that punctual inaccurate entire’s being registered at the base station. We speak concerning the security vulnerabilities of data aggregation supports, and bring a study of powerful and secure aggregation protocols that are stretchy to false data concoction attacks.
Keywords: Data Dggregation, Classification, Homomorphism and Secure Transmission.
Scope of the Article: Classification