2022
DOI: 10.3390/s22208022
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications

Abstract: In this paper, we describe the use of homomorphic encryption techniques in order to not only ensure the data are transmitted in a confidential way, but also to use the encrypted data to provide the manager with statistics that allow them to detect the incorrect functioning of a sensor node or a group of sensors due to either malicious data injection, data transmission, or simply sensor damage (miscalibration, faulty sensor functioning). Obtaining these statistical values does not need decryption, so the proces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Symmetric key encryption [134,135] is often used to secure confidential data because of its efficiency and speed. Another kind of encryption used in the IoT is public key encryption [136,137], which uses a pair of keys-a public one for encrypting and a private one for decrypting. Encrypting data with asymmetric keys takes more time, but the private key is never exposed, making this technique safer.…”
Section: Cryptographic Paradigm In Iotmentioning
confidence: 99%
“…Symmetric key encryption [134,135] is often used to secure confidential data because of its efficiency and speed. Another kind of encryption used in the IoT is public key encryption [136,137], which uses a pair of keys-a public one for encrypting and a private one for decrypting. Encrypting data with asymmetric keys takes more time, but the private key is never exposed, making this technique safer.…”
Section: Cryptographic Paradigm In Iotmentioning
confidence: 99%
“…HE can protect sensitive information by allowing the data to be calculated in encrypted form without exposing the raw data [1]. This capability is applicable and important in many sectors that require data privacy as their main priority, such as healthcare [1], finances [2], communications [3], manufacturing [4], and many more.…”
Section: Introductionmentioning
confidence: 99%