Research Article

Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency

Table 2

Comparison with security scheme.

ApproachesAdvantageLimitation

Prototyping [30]Can resist deauthentication attackHardware resource inclusion is not considered
Rule-based attack resistance [31, 33]Flexible formulation of attack-resisting rulesAttack specific solution
Software defined network [32]Offer more intelligenceCost-effectiveness is not assessed
Privacy preservation [34]Ensure better data integrity and privacyComputationally extensive algorithm
Blockchain [35, 36]Robust securityConsumes large energy

Proposed(i) Can handle multiple forms of attack and threats in PA
(ii) No sophisticated encryption is used
(iii) Multiple layers of security in each step
(iv) A higher degree of forward and backward secrecy
(v) Offers data security along with energy efficiency