Identity-based secure data aggregation in big data wireless sensor networks

被引:1
作者
Maivizhi, Radhakrishnan [1 ]
Yogesh, Palanichamy [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, Chennai, Tamil Nadu, India
关键词
big data; secure data aggregation; SDA; wireless sensor networks; WSNs; confidentiality; integrity; BROADCAST AUTHENTICATION; SCHEME;
D O I
10.1504/IJAHUC.2022.125035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data aggregation (SDA) is an inherent paradigm in big data wireless sensor networks (WSNs) to reduce data transmissions, maximise the network lifetime and provide security. However, SDA protocols that use elliptic curve suffer from mapping and reverse mapping functions. Currently, there is no known mapping function which is both homomorphic and effective in reverse mapping. In addition, SDA protocols that use public key infrastructure incurs high computation and communication cost. To overcome these challenges, this paper proposes a novel identity-based secure data aggregation (ISDA) protocol for big data wireless sensor networks. This protocol is based on bilinear pairing and combines identity-based homomorphic encryption scheme with identity-based signature to achieve end-to-end security. In WSNs, this is the first SDA protocol that employs both identity-based encryption and identity-based signature scheme. ISDA shares the same public/private keys during encryption and signature generation, which significantly reduces the complexity of the protocol. Security analysis reveals that ISDA is secure against various internal and external attacks and proves the correctness of the proposed protocol. Performance evaluation shows that ISDA incurs less overhead than state-of-the-art bilinear pairing-based SDA schemes, thereby it minimises the energy consumption and increases the lifetime of wireless sensor networks.
引用
收藏
页码:16 / 28
页数:14
相关论文
共 33 条
[1]  
Alghamdi WY, 2017, IEEE WCNC
[2]   A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems [J].
Ara, Anees, Jr. ;
Al-Rodhaan, Mznah ;
Tian, Yuan ;
Al-Dhelaan, Abdullah .
IEEE ACCESS, 2017, 5 :12601-12617
[3]   IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks [J].
Asad, Muhammad ;
Aslam, Muhammad ;
Nianmin, Yao ;
Ayoub, Naeem ;
Qureshi, Khalid Ibrahim ;
Munir, Ehsan Ullah .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 32 (02) :133-145
[4]  
Baum D., 2013, BIG DATA BIG OPPORTU
[5]   A light-weight solution for blackhole attacks in wireless sensor networks [J].
Bilgin, Bilal Erman ;
Baktir, Selcuk .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) :2557-2570
[6]   IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks [J].
Cao, Xuefei ;
Kou, Weidong ;
Dang, Lanjun ;
Zhao, Bin .
COMPUTER COMMUNICATIONS, 2008, 31 (04) :659-667
[7]  
Cheng S, 2015, IEEE INFOCOM SER
[8]   Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks [J].
Cui, Jie ;
Shao, Lili ;
Zhong, Hong ;
Xu, Yan ;
Liu, Lu .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) :1022-1037
[9]   Aggregation tree construction in sensor networks [J].
Ding, M ;
Cheng, XZ ;
Xue, GL .
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, :2168-2172
[10]  
Galbraith SD, 2013, MATH COMPUT, V82, P1181