Download Now Free registration required
The authors know that data are travelled from multiple hop in the network during its travelling some are the attacker may inject the false data into the pocket of message. These are cases raised regularly in wireless network because of non reliability, of course so many reliable techniques are developed by considering that they proposes some methods and protocol called DAA. The compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation.
- Format: PDF
- Size: 543.2 KB