Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks

被引:0
|
作者
Erskine, Samuel Kofi [1 ,2 ]
机构
[1] Univ Bridgeport, Comp Sci & Technol, Bridgeport, CT 06604 USA
[2] Florida A&M Univ, Dept Comp & Informat Sci, Tallahassee, FL 32310 USA
关键词
wireless sensor networks; secure data aggregation; authentication; authorization; time complexity; energy efficiency; privacy; PRESERVING DATA AGGREGATION; ENERGY-EFFICIENT; SCHEME; PROTOCOL; INTERNET;
D O I
10.3390/s24072090
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Existing secure data aggregation protocols are weaker to eliminate data redundancy and protect wireless sensor networks (WSNs). Only some existing approaches have solved this singular issue when aggregating data. However, there is a need for a multi-featured protocol to handle the multiple problems of data aggregation, such as energy efficiency, authentication, authorization, and maintaining the security of the network. Looking at the significant demand for multi-featured data aggregation protocol, we propose secure data aggregation using authentication and authorization (SDAAA) protocol to detect malicious attacks, particularly cyberattacks such as sybil and sinkhole, to extend network performance. These attacks are more complex to address through existing cryptographic protocols. The proposed SDAAA protocol comprises a node authorization algorithm that permits legitimate nodes to communicate within the network. This SDAAA protocol's methods help improve the quality of service (QoS) parameters. Furthermore, we introduce a mathematical model to improve accuracy, energy efficiency, data freshness, authorization, and authentication. Finally, our protocol is tested in an intelligent healthcare WSN patient-monitoring application scenario and verified using an OMNET++ simulator. Based upon the results, we confirm that our proposed SDAAA protocol attains a throughput of 444 kbs, representing a 98% of data/network channel capacity rate; an energy consumption of 2.6 joules, representing 99% network energy efficiency; an effected network of 2.45, representing 99.5% achieved overall performance of the network; and time complexity of 0.08 s, representing 98.5% efficiency of the proposed SDAAA approach. By contrast, contending protocols such as SD, EEHA, HAS, IIF, and RHC have throughput ranges between 415-443, representing 85-90% of the data rate/channel capacity of the network; energy consumption in the range of 3.0-3.6 joules, representing 88-95% energy efficiency of the network; effected network range of 2.98, representing 72-89% improved overall performance of the network; and time complexity in the range of 0.20 s, representing 72-89% efficiency of the proposed SDAAA approach. Therefore, our proposed SDAAA protocol outperforms other known approaches, such as SD, EEHA, HAS, IIF, and RHC, designed for secure data aggregation in a similar environment.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Secure Data Aggregation in Wireless Sensor Networks Using Privacy Homomorphism
    Sandhya, M. K.
    Murugan, K.
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 482 - 490
  • [2] Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 188 - 195
  • [3] Secure data aggregation using access control and authentication for wireless sensor networks
    Razaque, Abdul
    Rizvi, Syed S.
    [J]. COMPUTERS & SECURITY, 2017, 70 : 532 - 545
  • [4] Research of Privacy Preservation of Data Aggregation in Wireless Sensor Networks
    Liu, Zhenyu
    Xu, Feng
    [J]. 2021 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND INTELLIGENT CONTROL (ICCEIC 2021), 2021, : 16 - 19
  • [5] A Lightweight and Secure Data Authentication Scheme with Privacy Preservation forWireless Sensor Networks
    Zhong, Hong
    Shao, Lili
    Cui, Jie
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 210 - 217
  • [6] Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
    Jariwala, Vivaksha
    Patel, Himanshu
    Patel, Parth
    Jinwala, Devesh C.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (03) : 77 - 99
  • [7] E-LEACH: Improving the LEACH Protocol for Privacy Preservation in Secure Data Aggregation in Wireless Sensor Networks
    Patel, Himanshu B.
    Jinwala, Devesh C.
    [J]. 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 758 - 762
  • [8] Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks
    Parmar, Keyur
    Jinwala, Devesh C.
    [J]. INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 475 - 483
  • [9] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [10] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052