2019
DOI: 10.11591/ijece.v9i6.pp4889-4897
|View full text |Cite
|
Sign up to set email alerts
|

Secure data aggregation in IoT using Efficient-CSDA

Abstract: <p><span>In recent days, IoT has been widely accepted and WSN (Wireless Sensor network) is being used for variety of the applications such as transportation, medical, environmental, military, it moreover the main aim to deploy the WSN is to collect the data about the given set of phenomena. The common task of WSN is to sense the data and send over the network. Moreover, due to the various purpose such as statistical analysis, the data aggregation is required. <span> </span>However, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
(22 reference statements)
0
3
0
Order By: Relevance
“…The material and step on developing IoT will be systematic when the physical and virtual space was integrated by learning plan because it brought out what student needs, programming design, class layout, and also evaluation the learning. It match on teacher need to teach contextual science and engage social learning when student collaborate with others [47]. In addition, the most important things when it is established is whole design to boost student interest [48].…”
Section: Discussionmentioning
confidence: 99%
“…The material and step on developing IoT will be systematic when the physical and virtual space was integrated by learning plan because it brought out what student needs, programming design, class layout, and also evaluation the learning. It match on teacher need to teach contextual science and engage social learning when student collaborate with others [47]. In addition, the most important things when it is established is whole design to boost student interest [48].…”
Section: Discussionmentioning
confidence: 99%
“…For example, it is proposed to use the splunk SIEM solution to identify and block traffic from compromised IoT devices [12]. To ensure secure aggregation of data, it is proposed to use the efficient-CSDA algorithm [13], and various methods to ensure the security of storing, receiving and transmitting data are being studied [5]- [15].…”
Section: Technological Regulation: Risks and Threats Of The Iot 31 Different Approaches To Representing The Iot Architecturementioning
confidence: 99%
“…One of these tasks are the health monitoring. In fact, healthcare applications nowadays plays an essential role for tremendous people from different age and health levels [5,6]. Assume a group of people with chronical diseases, presenting a healthcare monitoring system that can check up their medical situation would be a promising solution for early alarm which can save hundreds of lives [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%