2020
DOI: 10.1109/access.2020.2994587
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking

Abstract: In a wireless sensor network, the sensors periodically transmit sensed data from a specific environment to a centralized station by wireless communication. Deployment in an open environment leads to the potential of security attacks. A sinkhole attack is a destructive attack aimed at the network layer, where the sinkhole node attracts other nodes by advertising itself as the best path to the base station. Subsequently receiving other sensor node packets and compromising network security. Hence, this work propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Cryptography is another mechanism for avoiding or at least minimizing the external attacks that target the Wireless Sensor Network. It can guarantee that different security services such as authentication and integrity by examining the source and contents of data packet using numerous methods such as symmetric encryption, public-key cryptography, and hash functions [13] [14]. This research illustrates how cryptography employed in securing the WSN from external kinds of attacks.…”
Section: Literature Reviewmentioning
confidence: 96%
“…Cryptography is another mechanism for avoiding or at least minimizing the external attacks that target the Wireless Sensor Network. It can guarantee that different security services such as authentication and integrity by examining the source and contents of data packet using numerous methods such as symmetric encryption, public-key cryptography, and hash functions [13] [14]. This research illustrates how cryptography employed in securing the WSN from external kinds of attacks.…”
Section: Literature Reviewmentioning
confidence: 96%
“…Regarding the data integrity, the hash function is used in the watermarking method in [101][102][103]. The authors in [101] propose the double-authentication strategy in the watermarking technology in order to secure the transfer of data from the source-drone along to the edge-router.…”
Section: Hashingmentioning
confidence: 99%
“…This proposal demonstrates the resistance to tampering and data replay. In [102], the researchers propose a lightweight watermark algorithm by using a homomorphic encryption and hash function along with the WSN data in order to embed the watermarking data. In [103], the watermark embedding locations and mechanisms are determined based on different channel conditions for ensuring the watermark security and energy efficiency.…”
Section: Hashingmentioning
confidence: 99%
“…The WSN has some security goals such as primary and secondary. The primary goal includes confidentiality, integrity, and authentication and the secondary goal includes data freshness, self-organization, secure localization, and self-organization [14,15]. The encryption has done using three keys: such as hash, private and public keys.…”
Section: Introductionmentioning
confidence: 99%