Research Article

Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT

Figure 3

(a) Device-to-EN data transfer volume comparison. (b) EN-to-IC data transfer volume comparison.
(a)
(b)