Security and Integument Preserving Top-k inquiry transforming to Two-Tiered sensor system

  • Uzba Hameed Salman, Karam M.Z. Othman, Ali A. Abdullah


The accumulating nodes, which go about as an inside level between those sensors and the sink, Might be undermined and license aggressors will make sense of fragile data Furthermore control request results. Previous plans concerning secure request changing would powerless, by virtue of they reveal non-unimportant data, and furthermore along these lines, assailant's camwood factually assess those data characteristics using zone taking in and the authentic background from asserting request results. With safeguard honesty, we prescribe a data fragment computation should portion every data thing under a between time Also join the section data with the data.