Research Article

Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

Table 2

The result after data division and blending in Scheme-II.


 +  +  +  + 
 +  +  +  + 
 +  +  +  + 
 +  +  +  +