Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

被引:1
|
作者
Pichumani, Saravanakumar [1 ]
Sundararajan, T. V. P. [2 ]
Dhanaraj, Rajesh Kumar [3 ]
Nam, Yunyoung [4 ]
Kadry, Seifedine [5 ]
机构
[1] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
[2] Shri Shakthi Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[3] Galgotias Univ, Greater Noida, Uttar Pradesh, India
[4] Soonchunhyang Univ, Dept Comp Sci & Engn, Asan, South Korea
[5] Noroff Univ Coll, Dept Appl Data Sci, Kristiansand, Norway
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 06期
关键词
WSN; Data aggregation; Security and privacy; Homomorphic Ephemeral Key Benaloh Cryptography; Ruzicka Indexive regression; EFFICIENT DATA AGGREGATION; SENSOR; SCHEME; ATTACK;
D O I
10.53106/160792642021112206008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the-art methods.
引用
收藏
页码:1287 / 1297
页数:11
相关论文
共 50 条
  • [41] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ullah, Ata
    Said, Ghawar
    Sher, Muhammad
    Ning, Huansheng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 163 - 174
  • [42] Secure Data Aggregation with Homomorphic Primitives in Wireless Sensor Networks: A Critical Survey and Open Research Issues
    Hayouni, Hay Them
    Hamdi, Mohamed
    2016 IEEE 13TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL (ICNSC), 2016,
  • [43] Secure Data Aggregation with Homomorphic Primitives in Wireless Sensor Networks: A Critical Survey and Open Research Issues
    Hayouni, Haythem
    Hamdi, Mohamed
    2016 IEEE 13TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL (ICNSC), 2016,
  • [44] SA-SPKC: Secure and efficient Aggregation scheme for wireless sensor networks using Stateful Public Key Cryptography
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2013 11TH INTERNATIONAL SYMPOSIUM ON PROGRAMMING AND SYSTEMS (ISPS), 2013, : 96 - 102
  • [45] A review of and a proposal for cross-layer design for efficient routing and secure data aggregation over WSN
    Mishra, Mukesh
    Sen Gupta, Gourab
    Gui, Xiang
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 120 - 125
  • [46] Data Ownership and Secure Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain
    Sammeta, Naresh
    Parthiban, Latha
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (03)
  • [47] Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
    Kang, David Ha Eun
    Kim, Duhyeong
    Song, Yongsoo
    Lee, Dongwon
    Kwak, Hyesun
    Anthony, Brian W.
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [48] A big-data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography
    Krishna, Addepalli V. N.
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (06): : 1387 - 1399
  • [49] Secure Data Aggregation Solution Based on Dynamic Multiple Cluster Key Management Model
    Lei, Feng-Yu
    Fu, Cai
    Li, Xi
    Chen, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (03): : 465 - 475
  • [50] Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
    Kumar, Mukesh
    Sethi, Monika
    Rani, Shalli
    Sah, Dipak Kumar
    AlQahtani, Salman A.
    Al-Rakhami, Mabrook S.
    SENSORS, 2023, 23 (13)