2020
DOI: 10.1007/s12652-020-01849-8
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In literature [13], a Hybrid GSW (Gentry, Sahai, and Waters) and DM (Ducas and Micciancio)related Fully Homomorphic Encryption (HGSW-DM-FHE) approach was presented to control the FDIA in privacy-preserving data aggregation in the fog computing environment. The presented HGSW-DM-FHE method was found to be extremely fault-tolerant, and the data aggregation procedure in another device did not impact even in the case of the failure of fog devices.…”
Section: Existing Fdi Detection Approachesmentioning
confidence: 99%
“…In literature [13], a Hybrid GSW (Gentry, Sahai, and Waters) and DM (Ducas and Micciancio)related Fully Homomorphic Encryption (HGSW-DM-FHE) approach was presented to control the FDIA in privacy-preserving data aggregation in the fog computing environment. The presented HGSW-DM-FHE method was found to be extremely fault-tolerant, and the data aggregation procedure in another device did not impact even in the case of the failure of fog devices.…”
Section: Existing Fdi Detection Approachesmentioning
confidence: 99%
“…In this part, the performance of our scheme is compared with other three similar and popular data aggregation schemes 45,50,51 . First, the features of these schemes are compared in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Sleeping mechanisms, Energy-aware routing, data aggregation, and congestion-aware routing have been presented approaches in IoT. In energy-aware routing, the present protocol contains node reliance techniques, energy-aware solar routing, data-driven approaches, multihop hierarchical clustering, duty cycling for extending lifetime of the network [7]. It can be fundamental process for saving energy and eliminating redundant data [8].…”
Section: Introductionmentioning
confidence: 99%