A secure and effective data aggregation in WSN for improved security and data privacy

S Suma Christal Mary, K Murugeswari, S Jyothi Shri, N Senthamilarasi
{"title":"A secure and effective data aggregation in WSN for improved security and data privacy","authors":"S Suma Christal Mary, K Murugeswari, S Jyothi Shri, N Senthamilarasi","doi":"10.18488/76.v10i3.3494","DOIUrl":null,"url":null,"abstract":"The increasing prevalence of internet usage and mobile devices has underscored the critical importance of safeguarding personal data. This is especially important in Wireless Sensor Networks (WSNs), where information typically requires in-network computing and collaborative processing. These computationally demanding approaches are not suitable for resource-constrained WSN nodes. Aggregating data effectively while protecting user data is a major challenge in wireless sensor networks. Many privacies of homomorphism encryption-based WSN data aggregation methods have been created and investigated recently. Since cluster leaders (aggregators) may rapidly combine cypher texts without decryption, communication overhead is reduced, making these data aggregation methods more secure than traditional ones. However, the base station only receives aggregated output, causing issues. Initial limits apply to aggregating functions. If the aggregated output is the sum of sensing data, the base station cannot acquire the maximum value. Second, attaching message digests or signatures to sensory samples does not allow the base station to validate data authenticity. In dangerous places, WSNs must be energy-efficient and private. In this research, we present a data aggregation method known as Energy-Efficient and Privacy-Preserving (E2P2). E2P2 data aggregation utilizes less energy and yields more accurate results. Private data aggregation with increased accuracy and hybrid encryption is presented in this research. The goal is to reduce data transmission and energy use collisions and offset collision-induced loss. Extensive simulations compare E2P2 to earlier approaches. Experimental results show that E2P2 outperforms other algorithms. Good exactness, complexity, and safety are demonstrated by theoretical and simulation results.","PeriodicalId":493889,"journal":{"name":"Review of computer engineering research","volume":"158 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Review of computer engineering research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18488/76.v10i3.3494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The increasing prevalence of internet usage and mobile devices has underscored the critical importance of safeguarding personal data. This is especially important in Wireless Sensor Networks (WSNs), where information typically requires in-network computing and collaborative processing. These computationally demanding approaches are not suitable for resource-constrained WSN nodes. Aggregating data effectively while protecting user data is a major challenge in wireless sensor networks. Many privacies of homomorphism encryption-based WSN data aggregation methods have been created and investigated recently. Since cluster leaders (aggregators) may rapidly combine cypher texts without decryption, communication overhead is reduced, making these data aggregation methods more secure than traditional ones. However, the base station only receives aggregated output, causing issues. Initial limits apply to aggregating functions. If the aggregated output is the sum of sensing data, the base station cannot acquire the maximum value. Second, attaching message digests or signatures to sensory samples does not allow the base station to validate data authenticity. In dangerous places, WSNs must be energy-efficient and private. In this research, we present a data aggregation method known as Energy-Efficient and Privacy-Preserving (E2P2). E2P2 data aggregation utilizes less energy and yields more accurate results. Private data aggregation with increased accuracy and hybrid encryption is presented in this research. The goal is to reduce data transmission and energy use collisions and offset collision-induced loss. Extensive simulations compare E2P2 to earlier approaches. Experimental results show that E2P2 outperforms other algorithms. Good exactness, complexity, and safety are demonstrated by theoretical and simulation results.
一种安全有效的无线传感器网络数据聚合方法,提高了无线传感器网络的安全性和数据保密性
互联网使用和移动设备的日益普及凸显了保护个人数据的至关重要性。这在无线传感器网络(wsn)中尤其重要,因为信息通常需要网络内计算和协作处理。这些计算量大的方法不适用于资源受限的WSN节点。在保护用户数据的同时有效地聚合数据是无线传感器网络面临的主要挑战。近年来,人们提出了许多基于同态加密的WSN数据聚合方法。由于集群领导者(聚合器)可以在不解密的情况下快速组合密码文本,因此减少了通信开销,使这些数据聚合方法比传统方法更安全。但是,基站只接收聚合的输出,从而导致问题。初始限制适用于聚合函数。如果聚合输出是传感数据的总和,基站无法获取最大值。其次,将消息摘要或签名附加到传感样本中不允许基站验证数据的真实性。在危险的地方,无线传感器网络必须是节能的和私有的。在本研究中,我们提出了一种称为节能和隐私保护(E2P2)的数据聚合方法。E2P2数据聚合使用更少的能量,产生更准确的结果。本研究提出了提高私有数据聚合精度和混合加密的方法。目标是减少数据传输和能量使用碰撞,抵消碰撞引起的损失。大量的模拟比较了E2P2和早期的方法。实验结果表明,E2P2算法优于其他算法。理论和仿真结果表明,该方法具有良好的准确性、复杂性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.90
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信