2017 2nd International Conference on Computing and Communications Technologies (ICCCT) 2017
DOI: 10.1109/iccct2.2017.7972286
|View full text |Cite
|
Sign up to set email alerts
|

Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…With the invention of new technologies, wireless sensors are being used in industries, health care, education, and utility grids. Due to their sensing capabilities, it makes them able to interact with machines, devices, and various appliances for controlling and monitoring [ 17 , 31 ]. Similarly, with the deployment of smart grids, wireless sensors are being deployed in smart homes and also at utility.…”
Section: Smart Homementioning
confidence: 99%
See 1 more Smart Citation
“…With the invention of new technologies, wireless sensors are being used in industries, health care, education, and utility grids. Due to their sensing capabilities, it makes them able to interact with machines, devices, and various appliances for controlling and monitoring [ 17 , 31 ]. Similarly, with the deployment of smart grids, wireless sensors are being deployed in smart homes and also at utility.…”
Section: Smart Homementioning
confidence: 99%
“…Since the smart grid is designed to facilitate its consumers, keeping the privacy of end users in a HAN is important. To date, a few schemes have been proposed, such as [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ] to create a safe communication route over vulnerable public networks. These schemes are aimed at establishing a framework that can potentially protect end users’ privacy.…”
Section: Introductionmentioning
confidence: 99%
“…The simplified utilization of the I2C bus is by using the Arduino software. Arduino is used to make interaction between hardware and software [10]. It is the most powerful and flexible tool for experienced users.…”
Section: 1mentioning
confidence: 99%
“…Additionally, a number of algorithms are required to be designed for the aim of searching and querying the encrypted information based on the Full Homomorrphic Encryption (FHE). In [7], an effective scheme, which also made use of the Homomorphic Encryption, was introduced for the protection of data privacy. The designed scheme was found capable of decreasing the overhead communication and the also the amount of energy consumed.…”
Section: Background and Related Workmentioning
confidence: 99%