2021
DOI: 10.1371/journal.pone.0260634
|View full text |Cite
|
Sign up to set email alerts
|

Compressive sensing based secure data aggregation scheme for IoT based WSN applications

Abstract: Compressive Sensing (CS) based data collection schemes are found to be effective in enhancing the data collection performance and lifetime of IoT based WSNs. However, they face major challenges related to key distribution and adversary attacks in hostile and complex network deployments. As a result, such schemes cannot effectively ensure the security of data. Towards the goal of providing high security and efficiency in data collection performance of IoT based WSNs, we propose a new security scheme that amalga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 50 publications
0
6
0
Order By: Relevance
“…Due to the advancement of IoT technology which enable the communication between billions of items, applications, data and people. Since most IoT devices communicate wirelessly with one another and/or the base station (BS) [12] [13]. The WSN serves as a bridge to the Internet of Things.…”
Section: Iot-wsnmentioning
confidence: 99%
“…Due to the advancement of IoT technology which enable the communication between billions of items, applications, data and people. Since most IoT devices communicate wirelessly with one another and/or the base station (BS) [12] [13]. The WSN serves as a bridge to the Internet of Things.…”
Section: Iot-wsnmentioning
confidence: 99%
“…For providing security to IoT data, the majority of previously developed research works use popular algorithms such as AES, 56,57 RSA, 58,59 blowfish, 60 and ECC. 61,62 However, except for RSA, most previously used encryption algorithms use symmetric keys for the process of encryption and decryption. However, suppose a third party uses the symmetric key.…”
Section: Problem Statementmentioning
confidence: 99%
“…Furthermore, they were unable to implement a robust cryptographic mechanism to ensure the security of transmitted data. For providing security to IoT data, the majority of previously developed research works use popular algorithms such as AES, 56,57 RSA, 58,59 blowfish, 60 and ECC 61,62 . However, except for RSA, most previously used encryption algorithms use symmetric keys for the process of encryption and decryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed method explains radar sensing by using 1D to 3D CS model, referring to a signal with the newest fifth-generation 5G NR standard. [21][22][23] The author demonstrates radio sensing by using the two uplink and downlink 5G signals will realize with a performance by using the CS model for providing high security and efficiency and then highpoint the advantages and challenges of this model.…”
Section: Related Workmentioning
confidence: 99%