Cargando…

Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications

In this paper, we describe the use of homomorphic encryption techniques in order to not only ensure the data are transmitted in a confidential way, but also to use the encrypted data to provide the manager with statistics that allow them to detect the incorrect functioning of a sensor node or a grou...

Descripción completa

Detalles Bibliográficos
Autores principales: López Delgado, Juan Luis, Álvarez Bermejo, José Antonio, López Ramos, Juan Antonio
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9607424/
https://www.ncbi.nlm.nih.gov/pubmed/36298373
http://dx.doi.org/10.3390/s22208022
_version_ 1784818540447006720
author López Delgado, Juan Luis
Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
author_facet López Delgado, Juan Luis
Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
author_sort López Delgado, Juan Luis
collection PubMed
description In this paper, we describe the use of homomorphic encryption techniques in order to not only ensure the data are transmitted in a confidential way, but also to use the encrypted data to provide the manager with statistics that allow them to detect the incorrect functioning of a sensor node or a group of sensors due to either malicious data injection, data transmission, or simply sensor damage (miscalibration, faulty sensor functioning). Obtaining these statistical values does not need decryption, so the process is sped up and can be developed in real time. Operating the data in this way ensures privacy and removes the need to maintain a shared key infrastructure between the sensor nodes and the manager nodes that are part of the blockchain infrastructure. In this work, we focus on operations with the sensor nodes that provide data that will be, later, treated as part of the business logic in the agribusiness sector (for example), hence the importance of having fast checking mechanisms in terms of data quality. The results obtained on conventional configurations of sensor nodes encourage the use of this technique in the aforementioned infrastructure.
format Online
Article
Text
id pubmed-9607424
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96074242022-10-28 Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications López Delgado, Juan Luis Álvarez Bermejo, José Antonio López Ramos, Juan Antonio Sensors (Basel) Article In this paper, we describe the use of homomorphic encryption techniques in order to not only ensure the data are transmitted in a confidential way, but also to use the encrypted data to provide the manager with statistics that allow them to detect the incorrect functioning of a sensor node or a group of sensors due to either malicious data injection, data transmission, or simply sensor damage (miscalibration, faulty sensor functioning). Obtaining these statistical values does not need decryption, so the process is sped up and can be developed in real time. Operating the data in this way ensures privacy and removes the need to maintain a shared key infrastructure between the sensor nodes and the manager nodes that are part of the blockchain infrastructure. In this work, we focus on operations with the sensor nodes that provide data that will be, later, treated as part of the business logic in the agribusiness sector (for example), hence the importance of having fast checking mechanisms in terms of data quality. The results obtained on conventional configurations of sensor nodes encourage the use of this technique in the aforementioned infrastructure. MDPI 2022-10-20 /pmc/articles/PMC9607424/ /pubmed/36298373 http://dx.doi.org/10.3390/s22208022 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
López Delgado, Juan Luis
Álvarez Bermejo, José Antonio
López Ramos, Juan Antonio
Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title_full Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title_fullStr Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title_full_unstemmed Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title_short Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
title_sort homomorphic asymmetric encryption applied to the analysis of iot communications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9607424/
https://www.ncbi.nlm.nih.gov/pubmed/36298373
http://dx.doi.org/10.3390/s22208022
work_keys_str_mv AT lopezdelgadojuanluis homomorphicasymmetricencryptionappliedtotheanalysisofiotcommunications
AT alvarezbermejojoseantonio homomorphicasymmetricencryptionappliedtotheanalysisofiotcommunications
AT lopezramosjuanantonio homomorphicasymmetricencryptionappliedtotheanalysisofiotcommunications