{"title":"On ensuring data integrity in data aggregation protocols in IoT environments","authors":"Mehdi Madjid Abbas, Omar Rafik Merad-Boudia","doi":"10.1109/ICAEE53772.2022.9962093","DOIUrl":null,"url":null,"abstract":"Data aggregation is the process of summarizing and combining data to reduce the amount of data transmission in the network. Data aggregation has become an absolute necessity for some IoT applications. In this sense, several aggregation schemes have been proposed but have dealt with security issues. Data confidentiality, authentication, and integrity are the primary security requirements for this type of aggregation scheme. In this paper, we are interested in authentication and data integrity. We present the most used signature algorithms, namely, ECDSA and BLS. We analyze these two signature schemes regarding security, the efficiency of calculations, and communications. In fact, we show that in the case of200 IoT devices, the aggregator needs 48,24 ms to perform a batch verification with ECDSA, while 289,44 ms are needed with BLS. Finally, we present a comparative study and recommendations for use.","PeriodicalId":206584,"journal":{"name":"2022 2nd International Conference on Advanced Electrical Engineering (ICAEE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Advanced Electrical Engineering (ICAEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEE53772.2022.9962093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data aggregation is the process of summarizing and combining data to reduce the amount of data transmission in the network. Data aggregation has become an absolute necessity for some IoT applications. In this sense, several aggregation schemes have been proposed but have dealt with security issues. Data confidentiality, authentication, and integrity are the primary security requirements for this type of aggregation scheme. In this paper, we are interested in authentication and data integrity. We present the most used signature algorithms, namely, ECDSA and BLS. We analyze these two signature schemes regarding security, the efficiency of calculations, and communications. In fact, we show that in the case of200 IoT devices, the aggregator needs 48,24 ms to perform a batch verification with ECDSA, while 289,44 ms are needed with BLS. Finally, we present a comparative study and recommendations for use.