Cargando…
Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the oth...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346161/ https://www.ncbi.nlm.nih.gov/pubmed/37448038 http://dx.doi.org/10.3390/s23136181 |
_version_ | 1785073248888684544 |
---|---|
author | Kumar, Mukesh Sethi, Monika Rani, Shalli Sah, Dipak Kumar AlQahtani, Salman A. Al-Rakhami, Mabrook S. |
author_facet | Kumar, Mukesh Sethi, Monika Rani, Shalli Sah, Dipak Kumar AlQahtani, Salman A. Al-Rakhami, Mabrook S. |
author_sort | Kumar, Mukesh |
collection | PubMed |
description | By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation. |
format | Online Article Text |
id | pubmed-10346161 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103461612023-07-15 Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks Kumar, Mukesh Sethi, Monika Rani, Shalli Sah, Dipak Kumar AlQahtani, Salman A. Al-Rakhami, Mabrook S. Sensors (Basel) Article By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation. MDPI 2023-07-06 /pmc/articles/PMC10346161/ /pubmed/37448038 http://dx.doi.org/10.3390/s23136181 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kumar, Mukesh Sethi, Monika Rani, Shalli Sah, Dipak Kumar AlQahtani, Salman A. Al-Rakhami, Mabrook S. Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title | Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title_full | Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title_fullStr | Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title_full_unstemmed | Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title_short | Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks |
title_sort | secure data aggregation based on end-to-end homomorphic encryption in iot-based wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10346161/ https://www.ncbi.nlm.nih.gov/pubmed/37448038 http://dx.doi.org/10.3390/s23136181 |
work_keys_str_mv | AT kumarmukesh securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks AT sethimonika securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks AT ranishalli securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks AT sahdipakkumar securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks AT alqahtanisalmana securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks AT alrakhamimabrooks securedataaggregationbasedonendtoendhomomorphicencryptioniniotbasedwirelesssensornetworks |