A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Security in wireless sensor networks
2019
International Journal of Informatics and Communication Technology (IJ-ICT)
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks
doi:10.11591/ijict.v8i1.pp13-18
fatcat:sosm5cpobzfixbvaaa5zswgbza