Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks

Author:

Kumar Mukesh1,Sethi Monika2,Rani Shalli2ORCID,Sah Dipak Kumar3,AlQahtani Salman A.4ORCID,Al-Rakhami Mabrook S.5ORCID

Affiliation:

1. Panipat Institute of Engineering and Technology, Panipat 132103, Haryana, India

2. Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India

3. Department of Computer Engineering and Applications, GLA University, Mathura 281406, Uttar Pradesh, India

4. Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia

5. Department of Information Systems, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia

Abstract

By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference31 articles.

1. Security for Wireless Sensor Network;Singh;Int. J. Comput. Sci. Eng.,2011

2. In-Network Aggregation Techniques for Wireless Sensor Networks: A Survey;Fasolo;IEEE Wirel. Commun.,2007

3. Znaidi, W., Minier, M., and Babau, J.P. (2008, January 15–18). Detecting wormhole attacks in wireless networks using local neighborhood information. Proceedings of the IEEE Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France.

4. Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption;Othman;Wirel. Pers. Commun.,2015

5. Sen, J. (2010). Theory and Practice of Cryptography and Network Security Protocols and Technologies, Intech Publishers.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3