588 Hits in 3.6 sec

Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks

Keyur Parmar, Devesh C. Jinwala
2015 Journal of Information Security  
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation.  ...  As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network's lifetime.  ...  Acknowledgements This research was a part of the project "A Secure Data Aggregation System and An Intrusion Detection System for Wireless Sensor Networks".  ... 
doi:10.4236/jis.2015.61005 fatcat:jxdaqm56ynb65kxtcsrrpaini4


Shahina K, Vaidehi Vijayakumar
2017 Asian Journal of Pharmaceutical and Clinical Research  
Homomorphic encryption is one of such technique. In homomorphic encryption, all the nodes participate in the aggregation.  ...  Wireless sensor networks are energy constrained. Data aggregation is an important mechanism for achieving energy efficiency in such networks.  ...  of integrity protecting hierarchical concealed data aggregation Data aggregation with recoverable concealed data aggregation Different phases of secured data aggregation with homomorphic primitives Network  ... 
doi:10.22159/ajpcr.2017.v10s1.19749 fatcat:friwg5yqf5apjkcblcpma6zayy

An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks

Qiang Zhou, Geng Yang, Liwen He
2014 International Journal of Distributed Sensor Networks  
This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP).  ...  To the best of our knowledge, this is the first work that provides both integrity and privacy based on homomorphic primitives.  ...  Section 4 presents a new secure data aggregation scheme based on homomorphic primitives.  ... 
doi:10.1155/2014/962925 fatcat:ijiosftgrzbcrhub4eztz3jvnq

An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

Sabrina Boubiche, Djallel Boubiche, Azzedine Bilami, Homero Toral-Cruz
2016 Sensors  
A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.  ...  Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency.  ...  Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks (Sen-SDA) Sen-SDA was proposed by Shim [18] .  ... 
doi:10.3390/s16040525 pmid:27077866 pmcid:PMC4851039 fatcat:3kt4hq4tmnbb7kaujifd4chop4

Secure Hierarchical Data Aggregation in Wireless Sensor Networks

Julia Albath, Sanjay Madria
2009 2009 IEEE Wireless Communications and Networking Conference  
We propose a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in-network aggregation in wireless sensor networks.  ...  Communication in wireless sensor networks uses the majority of a sensor's limited energy. Using aggregation in wireless sensor network reduces the overall communication cost.  ...  Integrity of the aggregate result can easily be achieved on a hop-by-hop basis in wireless sensor networks.  ... 
doi:10.1109/wcnc.2009.4917960 dblp:conf/wcnc/AlbathM09 fatcat:yzxbpiioyvgm3ofwxclagho7sy

Implementing Privacy Homomorphism in Data Aggregation for Wireless Sensor Networks

Y. Sandeep, Mohammed Ali Hussain
2017 Indian Journal of Science and Technology  
Objective: To design and implement a methodology to achieve privacy and security of data in Wireless Sensor Network (WSN) through malleability resilient concealed data aggregation protocol. Analysis:  ...  Inputs and suggestions by Embedded Systems and Sensor Networks ESSN of K.L. University are duly acknowledged.  ...  Secure DA mainly focuses on two objectives, 1) Data Aggregation and 2) Security. Security of DA in the network can be classified based on either hop-by-hop or point-to-point.  ... 
doi:10.17485/ijst/2017/v10i4/110668 fatcat:hxxwpehumrgadlkx7j7jpxzl2i

Secure Data Aggregation for Wireless Sensor Network using Lightweight Cryptography

S. A. Bragadeesh, A. Umamakeswari
2016 Indian Journal of Science and Technology  
Methods: A method for implementing secure data aggregation using Lightweight Cryptographic primitives is proposed which is suitable for resource constrained networks.  ...  Data aggregation is the process which provides capabilities like In-Network processing, reducing the communication overhead, eliminating redundant packet transmissions and increases the lifetime of the  ...  The primitive works on secure data aggregation focussed primarily on data integrity alone. A method which uses designated nodes known as witnesses to monitor the aggregation process is proposed 4 .  ... 
doi:10.17485/ijst/2016/v9i48/108002 fatcat:utg4ecpmvzebneo2k574ohbcqy

Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks

Vimal Kumar, Sanjay Madria
2010 2010 Eleventh International Conference on Mobile Data Management  
In this paper we study the performance of an end to end secure data aggregation scheme on wireless sensors.  ...  We measure the execution time and energy consumption of various cryptographic functions on the motes and analyze how an end to end scheme increases the network life time in a WSN compared to a hop by hop  ...  Security in Wireless Sensor Networks Two important security primitives in wireless sensor networks are data confidentiality and data integrity.  ... 
doi:10.1109/mdm.2010.37 dblp:conf/mdm/KumarM10 fatcat:ddidhzwuobgmbciqdfq3oe6ajq

Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks

Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu
2017 Peer-to-Peer Networking and Applications  
In wireless sensor networks, data aggregation allows in-network processing, which leads to reduced packet transmissions and reduced redundancy, and thus is helpful to prolong the overall lifetime of wireless  ...  achieve end-to-end data integrity.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s12083-017-0581-5 fatcat:3zelg3ek6ferboqtkgtl4brw3u

SPEEDA: A Secure Protocol and Energy Efficient for Data Aggregation in Wireless Sensor Networks

Sarah Wayzani, Chérif Diallo
2018 International Journal of Engineering & Technology  
In this paper, we will give an overview study of the existing data aggregation solutions in wireless sensor networks then, we will propose a new efficient and secure approach to aggregation which can be  ...  This solution concerns the aggregation of data which is one of the techniques that is actually considered as an essential paradigm for sensor networks since it tends to save computation and communication  ...  Ozdemir Scheme The protocol proposed by Ozdemir in [14] (CDAP) is also based on homomorphic encryption like [9] to ensure the security of aggregated data.  ... 
doi:10.14419/ijet.v7i4.20.27422 fatcat:2w2olqxq7jen7grogrtctpqnze

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

2015 KSII Transactions on Internet and Information Systems  
To address the contradiction between data aggregation and data security in wireless sensor networks, a Recoverable Privacy-preserving Integrity-assured Data Aggregation (RPIDA) scheme is proposed based  ...  In our scheme, the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators, thus can verify the integrity of all sensing data.  ...  data aggregation scheme based on privacy homomorphism and aggregate MAC.  ... 
doi:10.3837/tiis.2015.12.025 fatcat:cx5syyv2erg2vd6l7axdiipttq

Secure data aggregation in wireless sensor networks: A comprehensive overview

Suat Ozdemir, Yang Xiao
2009 Computer Networks  
In addition, based on the existing research, the open research areas and future research directions in secure data aggregation concept are provided.  ...  Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network.  ...  In wireless sensor networks, a compromised sensor node can inject false data during data forwarding and aggregation to forge the integrity of aggregated data.  ... 
doi:10.1016/j.comnet.2009.02.023 fatcat:4fkkaihsvbbohjaxrv7bxec23i

EPPDA: An Efficient and Privacy-Preserving Data Aggregation Scheme with Authentication and Authorization for IoT-Based Healthcare Applications

Faris A. Almalki, Ben Othman Soufiene, Chien-Ming Chen
2021 Wireless Communications and Mobile Computing  
EPPDA, also, uses additive homomorphic encryption to protect data privacy and combines it with homomorphic MAC to check the data integrity.  ...  Thus, there is a need for secure data aggregation while preserving the data integrity and privacy of the patient.  ...  To solve the problems mentioned above, this paper proposes a novel secure data aggregation scheme based on homomorphic primitives, called Secure and Privacy Preserving Data Aggregation (EPPDA) designed  ... 
doi:10.1155/2021/5594159 fatcat:lbhrr5p7yjeozey6bbbv4qlszq

Privacy Preserving Secure Data Aggregation for Wireless Sensor Networks

Vivaksha J. Jariwala
2018 Journal of Computers  
Key words: Elliptic curve cryptography, in-network processing, privacy homomorphism, secure data aggregation, wireless sensor networks (WSNs).  ...  The sensor nodes designated as the aggregator nodes, carry out such aggregation and the technique of processing the data on the fly in the network itself, is known as in-network processing.  ...  Network Architecture In wireless sensor networks, the sensor nodes are randomly distributed in an open area.  ... 
doi:10.17706/jcp.13.6.655-677 fatcat:kuqlfztabzfcfj3flm6o56rgzu

Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks

Xing Li, Dexin Chen, Chunyan Li, Liangmin Wang
2015 Sensors  
This paper proposes Fully homomorphic Encryption based Secure data Aggregation (FESA) in LWSNs which can protect end-to-end data confidentiality and support arbitrary aggregation operations over encrypted  ...  The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs).  ...  Author Contributions All authors have contributed to the presented work in various degrees. Xing Li proposed the protocol, designed the research and drafted the manuscript.  ... 
doi:10.3390/s150715952 pmid:26151208 pmcid:PMC4541862 fatcat:t4lyddpeuzf37jws6wdinrd4yi
« Previous Showing results 1 — 15 out of 588 results