🕔 Call For Paper — Vol. 13 | Issue 4 | April 2026 | Deadline: 30-Apr-2026
Track Paper Submit Paper Home
📢 NOTICE
📢 Call for Papers — Volume 12, Issue 4 (April 2026) | Submission Deadline: April 30, 2026 | Rapid peer review: 2–3 days | Impact Factor: 7.37 (SJIF 2026)

Paper Details

📄 IJAERD-OJS-1737

Secure Data Aggregation Technique For Wireless Networks

Author(s):Siddharth C Sawai, Prof. S. N. Shelke
Institution:M.E Computer Science And Engineering, Sinhgad Academy of Engineering , Kondhwa, Pune,
Published In:Vol. 4, Issue 1 — January 2017
Page No.:1-5
Domain:Engineering
Type:Research Paper
ISSN (Online):2348-4470
ISSN (Print):2348-6406
Abstract

Due to restricted procedure power resources and energy resources, aggregation of data from multiplesensing element nodes done at the aggregating node is sometimes accomplished by easy strategies like averaging. butsuch aggregation is thought to be extremely liable to node compromising attacks. Since WSN are typically unattendedand while not tamper resistant hardware, they're extremely prone to such attacks. Thus, ascertaining trait of knowledgeand name of sensing element nodes is crucial for WSN. Because the performance of terribly low power processorsdramatically improves, future individual nodes are going to be capable of playing additional refined informationaggregation algorithms, therefore creating WSN less vulnerable. Repetitive filtering algorithms hold nice promise forsuch a purpose. Such algorithms at the same time mixture information from multiple sources and supply trust assessmentof those sources, typically in a very type of corresponding weight factors allotted to information provided by everysupply. During this paper we tend to demonstrate that many existing repetitive filtering algorithms, whereas considerablyadditional strong against collusion attacks than the easy averaging strategies, are nonetheless susceptive to a uniquerefined collusion attack we tend to introduce. To deal with this security issue, we tend to propose AN improvement forrepetitive filtering techniques by providing AN initial approximation for such algorithms that makes them not solelycollusion strong, however conjointly additional correct and quicker joining.

🗎 Download PDF 🏆 Get Certificate
🕮 How to Cite

Siddharth C Sawai, Prof. S. N. Shelke, “Secure Data Aggregation Technique For Wireless Networks”, International Journal of Advance Engineering and Research Development (IJAERD), Vol. 4, Issue 1, pp. 1-5, January 2017.

Related Papers

📄 Submit Your Paper

Open Access • Peer Reviewed • CrossRef DOI
UGC Approved • Monthly Publication

Submit Now →
📅 Submission Deadline
30 Apr 2026
Vol. 13 | Issue 4
April 2026