Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

被引:1
|
作者
Pichumani, Saravanakumar [1 ]
Sundararajan, T. V. P. [2 ]
Dhanaraj, Rajesh Kumar [3 ]
Nam, Yunyoung [4 ]
Kadry, Seifedine [5 ]
机构
[1] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
[2] Shri Shakthi Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[3] Galgotias Univ, Greater Noida, Uttar Pradesh, India
[4] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
[5] Noroff Univ Coll, Dept Appl Data Sci, Kristiansand, Norway
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 06期
关键词
WSN; Data aggregation; Security and privacy; Homomorphic Ephemeral Key Benaloh Cryptography; Ruzicka Indexive regression; EFFICIENT DATA AGGREGATION; SENSOR; SCHEME; ATTACK;
D O I
10.53106/160792642021112206008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the-art methods.
引用
收藏
页码:1287 / 1297
页数:11
相关论文
共 50 条
  • [31] Trust secure data aggregation in WSN-based IIoT with single mobile sink
    Liu, Xiaowu
    Yu, Jiguo
    Yu, Kan
    Wang, Guijuan
    Feng, Xingjian
    AD HOC NETWORKS, 2022, 136
  • [32] Trust secure data aggregation in WSN-based IIoT with single mobile sink
    Liu, Xiaowu
    Yu, Jiguo
    Yu, Kan
    Wang, Guijuan
    Feng, Xingjian
    Ad Hoc Networks, 2022, 136
  • [33] Compressive sensing based secure data aggregation scheme for IoT based WSN applications
    Salim, Ahmed
    Ismail, Ahmed
    Osamy, Walid
    Khedr, Ahmed M.
    PLOS ONE, 2021, 16 (12):
  • [34] Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
    Li, Xing
    Chen, Dexin
    Li, Chunyan
    Wang, Liangmin
    SENSORS, 2015, 15 (07): : 15952 - 15973
  • [35] At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid
    Ben Romdhane, Rihem
    Hammami, Hamza
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1067 - 1072
  • [36] Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN
    Ganeshan, Arulkumaran
    Jayagopalan, Santhosh
    Perumal, Balamurugan
    Sarveshwaran, Velliangiri
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (28):
  • [37] Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing
    Kim, Won-Bin
    Kim, Su-Hyun
    Seo, Daehee
    Lee, Im-Yeong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [38] Secure data aggregation using quantum key management in IoT networks
    Thenmozhi R.
    Sakthivel P.
    Kulothungan K.
    Journal of Intelligent and Fuzzy Systems, 2024, 1 (01):
  • [39] Energy-efficient adaptive slice-based secure data aggregation scheme in WSN
    Hua, Pengwei
    Liu, Xiaowu
    Yu, Jiguo
    Dang, Na
    Zhang, Xiaowei
    2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2018, 129 : 188 - 193
  • [40] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ata Ullah
    Ghawar Said
    Muhammad Sher
    Huansheng Ning
    Peer-to-Peer Networking and Applications, 2020, 13 : 163 - 174