Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

被引:1
|
作者
Pichumani, Saravanakumar [1 ]
Sundararajan, T. V. P. [2 ]
Dhanaraj, Rajesh Kumar [3 ]
Nam, Yunyoung [4 ]
Kadry, Seifedine [5 ]
机构
[1] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
[2] Shri Shakthi Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[3] Galgotias Univ, Greater Noida, Uttar Pradesh, India
[4] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
[5] Noroff Univ Coll, Dept Appl Data Sci, Kristiansand, Norway
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 06期
关键词
WSN; Data aggregation; Security and privacy; Homomorphic Ephemeral Key Benaloh Cryptography; Ruzicka Indexive regression; EFFICIENT DATA AGGREGATION; SENSOR; SCHEME; ATTACK;
D O I
10.53106/160792642021112206008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the-art methods.
引用
收藏
页码:1287 / 1297
页数:11
相关论文
共 50 条
  • [1] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [2] Horse herd optimised elliptic curve cryptography for secure data aggregation in WSN
    Manoharan, Maravarman
    Subramani, Babu
    Ramu, Pitchai
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 46 (04) : 231 - 247
  • [3] Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation
    Wang, Licheng
    Wang, Lihua
    Pan, Yun
    Zhang, Zonghua
    Yang, Yixian
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 493 - +
  • [4] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801
  • [5] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Ben Othman, Soufiene
    Bahattab, Abdullah Ali
    Trad, Abdelbasset
    Youssef, Habib
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 867 - 889
  • [6] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Soufiene Ben Othman
    Abdullah Ali Bahattab
    Abdelbasset Trad
    Habib Youssef
    Wireless Personal Communications, 2015, 80 : 867 - 889
  • [7] A public static agreement key based cryptography for secure data transmission in WSN based smart environment application
    Kumar, M. Satheesh
    Kumar, P. Ganesh
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 246
  • [8] Applying Homomorphic Cryptography Methods to the Development of Secure Big Data Management Systems
    Poltavtseva, M.
    Shenets, N.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 251 - 259
  • [9] Secure Data Aggregation in WSN using Iterative Filtering algorithm
    Choudhari, Ekta
    Bodhe, Ketan D.
    Mundada, Snehal M.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 205 - 209
  • [10] Secure and scalable data aggregation techniques for healthcare monitoring in WSN
    Alate, Mahendra
    Godase, Uma R.
    Kumbhar, Uddhav T.
    Hundekari, Sheela
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 441 - 452