2015 Information Security for South Africa (ISSA) 2015
DOI: 10.1109/issa.2015.7335058
|View full text |Cite
|
Sign up to set email alerts
|

Data aggregation using homomorphic encryption in wireless sensor networks

Abstract: Degree:Master of Engineering (Computer Engineering)Keywords: wireless sensor networks, homomorphic encryption, network security, aggregation Wireless sensor networks have become increasingly popular in many applications such as environment monitoring and law enforcement. Data aggregation is a method used to reduce network traffic but cannot be used together with conventional encryption schemes because it is not secure and introduces extra overhead. Homomorphic encryption is an encryption scheme that allows dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 63 publications
0
7
0
Order By: Relevance
“…The use of homomorphic cryptography for privacy-preserving aggregation has been explored in multiple applications, including wireless sensor networks [53], smart metering [3], and collaboration systems [54]. In all these cases, the use of homomorphic encryption and the adversarial models follow a common pattern and are very similar among them and to our proposal.…”
Section: Related Workmentioning
confidence: 78%
“…The use of homomorphic cryptography for privacy-preserving aggregation has been explored in multiple applications, including wireless sensor networks [53], smart metering [3], and collaboration systems [54]. In all these cases, the use of homomorphic encryption and the adversarial models follow a common pattern and are very similar among them and to our proposal.…”
Section: Related Workmentioning
confidence: 78%
“…References and show that this scheme is quite energy‐efficient, thanks to exploiting addition operation in various wireless sensor network topologies. This scheme is generally used in wireless sensor networks, mobile ad‐hoc networks, and cloud computing . Nevertheless, it has been preferred in our study because it employs a symmetric key based homomorphic scheme utilizing addition operation in the aggregation process that is different from the Paillier scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In Reference , feasibility and scalability of the DF scheme are evaluated by focusing on the effects of message size, key size, and message split size on the performance. In Reference , the DF SDA scheme is compared with RC4. The performance results indicate that the RC4 works more efficiently than DF for small‐size networks.…”
Section: Related Workmentioning
confidence: 99%
“…The security in WiMAX is required to be integrated so that it can provide the sufficient and effective protection repelling against the intrusion and other related types of unauthorised access without any type of hindrance in the overall operation. Differences between assorted wireless technologies are - [1] Homomorphic based encryption is the classical and key issue addressed and avoided in this work. In this work, the authors performed the implementation using symmetric key encryption as well as homomorphic deployment to improve the overall performance of the system.…”
Section: Wi-maxmentioning
confidence: 99%