Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

被引:1
|
作者
Pichumani, Saravanakumar [1 ]
Sundararajan, T. V. P. [2 ]
Dhanaraj, Rajesh Kumar [3 ]
Nam, Yunyoung [4 ]
Kadry, Seifedine [5 ]
机构
[1] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
[2] Shri Shakthi Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[3] Galgotias Univ, Greater Noida, Uttar Pradesh, India
[4] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
[5] Noroff Univ Coll, Dept Appl Data Sci, Kristiansand, Norway
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 06期
关键词
WSN; Data aggregation; Security and privacy; Homomorphic Ephemeral Key Benaloh Cryptography; Ruzicka Indexive regression; EFFICIENT DATA AGGREGATION; SENSOR; SCHEME; ATTACK;
D O I
10.53106/160792642021112206008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the-art methods.
引用
收藏
页码:1287 / 1297
页数:11
相关论文
共 50 条
  • [21] ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)
    Ertaul, L
    Lu, WM
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 102 - 113
  • [22] CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN
    Hajian, R.
    Erfani, S. H.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 5045 - 5075
  • [23] Fast and Secure Implementation of ECC-based concealed data aggregation in WSN
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2013 GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM, 2013,
  • [24] CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN
    R. Hajian
    S. H. Erfani
    The Journal of Supercomputing, 2021, 77 : 5045 - 5075
  • [25] A Homomorphic MAC-based Secure Data Aggregation Scheme for Wireless Sensor Networks
    Liu, Yun
    Li, Chaoran
    Zhang, Jing
    Liu, Qing
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2069 - 2077
  • [26] A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    AD HOC NETWORKS, 2015, 32 : 98 - 113
  • [27] Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation
    Pedrouzo-Ulloa, Alberto
    Boudguiga, Aymen
    Chakraborty, Olive
    Sirdey, Renaud
    Stan, Oana
    Zuber, Martin
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 612 - 617
  • [28] Secure Hybrid Data Transmission Protocol for WSN with Key Management and Message Authentication
    A Sharmila
    Vinay Rishiwal
    Pramod Kumar
    Mano Yadav
    Preeti Yadav
    SN Computer Science, 6 (5)
  • [29] Secure Data in Cloud Computing Using Fully Homomorphic Encryption and Public Key Infrastructure
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 5950 - 5958
  • [30] A Secure Data Getting/Transmitting protocol for WSN in IoT Using Revocable Storage Identity Based Cryptography
    Lavanya, P.
    Sangeetha, A.
    Kumar, K. Raj
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 1164 - 1170