2014
DOI: 10.1007/s11277-014-2061-z
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption

Abstract: Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data confidentiality and integrity is mounting a challenge. The existing solutions either have large communication and computation overheads or produce inaccurate results. This paper proposes a novel secure data aggregation scheme based on homomorphic encryption in WSNs. The scheme adopts a symmetric-key homomorphic encryption to protect data privacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
46
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(46 citation statements)
references
References 31 publications
0
46
0
Order By: Relevance
“…Multiple proposals have been developed, from the aggregation of values [5,6,7,28,29,30,31,32,33,34,35,36], to additions [2,3,26,37,38,39,40,41,42,43], calculus of minimums or maximums [10,44,45] or even more complex tasks such as averages [9,10,30,46], variances [9,46], range queries [6] or logic operations [8].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Multiple proposals have been developed, from the aggregation of values [5,6,7,28,29,30,31,32,33,34,35,36], to additions [2,3,26,37,38,39,40,41,42,43], calculus of minimums or maximums [10,44,45] or even more complex tasks such as averages [9,10,30,46], variances [9,46], range queries [6] or logic operations [8].…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity is generally achieved by the use of cryptographic schemes, e.g. symmetric encryption [2,6,7,30] or more sophisticated schemes like homomorphic encryption [8,37,38,39,31,40,41,42,43,46], homomorphic aggregation of signatures [36] and homomorphic encryption with re-randomization applying a proxy [5]. By contrast, Groat et al [44] propose the use of randomized arrays instead of a cryptographic system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…With varying network topology, such as cluster based [2], tree based [3], chain based [4], various data aggregation schemes have been proposed [4], [5], [6], [7], [8], [9]. Data aggregation mainly exploits the redundancy in the spatially and temporally corelated data sensed by the nodes [10].…”
Section: Related Workmentioning
confidence: 99%