Provided by: International Journal of Computing and Technology (IJCAT)
Topic: Data Management
Wireless sensor networks are different from that in commonsense mobile ad-hoc networks. CDA (Concealed Data Aggregation) provides end-to-end security.ie. Even though the sensed data are encrypted on the sensor nodes and not decrypted before the sink node. In this paper, all the homomorphism encryption techniques and various attacks is categorized, but CDA schemes are not satisfy multi-application environments and not provide secure counting; so they may suffer unauthorized aggregation attacks. Therefore, a new concealed data aggregation scheme based on homomorphism public encryption system.