2015
DOI: 10.3390/s150715952
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks

Abstract: With the rapid development of wireless communication technology, sensor technology, information acquisition and processing technology, sensor networks will finally have a deep influence on all aspects of people’s lives. The battery resources of sensor nodes should be managed efficiently in order to prolong network lifetime in large-scale wireless sensor networks (LWSNs). Data aggregation represents an important method to remove redundancy as well as unnecessary data transmission and hence cut down the energy u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(24 citation statements)
references
References 30 publications
0
24
0
Order By: Relevance
“…After the aggregation and encryption process is completed, the aggregation node forwards the encrypted data to the cluster head node, 'CH', as described in Step 10. Finally, in Steps 11-12, the base station receives the encrypted aggregation data from the cluster head node CH B s using the algorithm defined in [9].…”
Section: ) Data Fragmentation Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…After the aggregation and encryption process is completed, the aggregation node forwards the encrypted data to the cluster head node, 'CH', as described in Step 10. Finally, in Steps 11-12, the base station receives the encrypted aggregation data from the cluster head node CH B s using the algorithm defined in [9].…”
Section: ) Data Fragmentation Algorithmmentioning
confidence: 99%
“…In this section, we discuss the secret key with the SEEDA protocol. We are using a fully homomorphic encryption algorithm that can protect end-to-end data confidentiality as defined in [9] and perform encryption on the aggregated data before sending it to the base station nodes. We are employing the encryption process when the data information gets to the aggregation node because the monitor nodes and relay nodes are focusing on the fragmentation process to hide the original data from the adversary.…”
Section: ) Secret Keymentioning
confidence: 99%
See 1 more Smart Citation
“…In [ 39 ], the authors proposed a scheme called Fully homomorphic Encryption based Secure data Aggregation (FESA) in large-scale wireless sensor networks (LWSNs) based on message authentication codes (MACs) to support arbitrary aggregation operations and provide end-to-end data confidentiality. This scheme involves complete data encryption and incurs increased computational overhead because of its large public key size.…”
Section: Related Workmentioning
confidence: 99%
“…Data can be easily aggregated in base station, but this model does not authenticate the data sender and does not support integrity of the data or prevent false data detection. A variation of DAA is proposed by (Li et al, 2015) that uses fully homomorphic encryption to encrypt the data. Privacy homomorphism over elliptic curve cryptography along with a message authentication code is proposed by (Ozdemir and Xiao, 2011) to preserves data confidentiality and integrity in hierarchical data aggregation.…”
Section: Introductionmentioning
confidence: 99%