Affiliation:
1. College of Science and Technology, University of Bridgeport, Bridgeport, CT 06604, USA
2. Department of Computer Information Science, Florida A & M University, Tallahassee, FL 32310, USA
Abstract
Existing secure data aggregation protocols are weaker to eliminate data redundancy and protect wireless sensor networks (WSNs). Only some existing approaches have solved this singular issue when aggregating data. However, there is a need for a multi-featured protocol to handle the multiple problems of data aggregation, such as energy efficiency, authentication, authorization, and maintaining the security of the network. Looking at the significant demand for multi-featured data aggregation protocol, we propose secure data aggregation using authentication and authorization (SDAAA) protocol to detect malicious attacks, particularly cyberattacks such as sybil and sinkhole, to extend network performance. These attacks are more complex to address through existing cryptographic protocols. The proposed SDAAA protocol comprises a node authorization algorithm that permits legitimate nodes to communicate within the network. This SDAAA protocol’s methods help improve the quality of service (QoS) parameters. Furthermore, we introduce a mathematical model to improve accuracy, energy efficiency, data freshness, authorization, and authentication. Finally, our protocol is tested in an intelligent healthcare WSN patient-monitoring application scenario and verified using an OMNET++ simulator. Based upon the results, we confirm that our proposed SDAAA protocol attains a throughput of 444 kbs, representing a 98% of data/network channel capacity rate; an energy consumption of 2.6 joules, representing 99% network energy efficiency; an effected network of 2.45, representing 99.5% achieved overall performance of the network; and time complexity of 0.08 s, representing 98.5% efficiency of the proposed SDAAA approach. By contrast, contending protocols such as SD, EEHA, HAS, IIF, and RHC have throughput ranges between 415–443, representing 85–90% of the data rate/channel capacity of the network; energy consumption in the range of 3.0–3.6 joules, representing 88–95% energy efficiency of the network; effected network range of 2.98, representing 72–89% improved overall performance of the network; and time complexity in the range of 0.20 s, representing 72–89% efficiency of the proposed SDAAA approach. Therefore, our proposed SDAAA protocol outperforms other known approaches, such as SD, EEHA, HAS, IIF, and RHC, designed for secure data aggregation in a similar environment.
Reference42 articles.
1. Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks;Zhou;IEEE Internet Things J.,2020
2. Ramonet, A.G., and Noguchi, T. (2020, January 6–8). Node Replacement Method for Disaster Resilient Wireless Sensor Networks. Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.
3. Srivastava, S., and Singh, J. (2021, January 17–18). Wireless Communication Security Breaches in Smart Healthcare Applications. Proceedings of the 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India.
4. Binh, H.T.T., Binh, N.T.M., Hoang, N.H., and Tu, P.A. (2016, January 21–23). Heuristic algorithm for finding maximal breach path in a wireless sensor network with omnidirectional sensors. Proceedings of the 2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Agra, India.
5. Mulik, V., and Patil, V. (2023, January 18–19). Wireless Visual Sensor Network Application in Monitoring and Detection of Agricultural Crop Diseases: Review. Proceedings of the 2023 7th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India.