• Corpus ID: 22819372

Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks

@article{Qin2016ResearchOS,
  title={Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks},
  author={Danyang Qin and Shuang Jia and Songxiang Yang and Erfu Wang and Qun Ding},
  journal={J. Inf. Hiding Multim. Signal Process.},
  year={2016},
  volume={7},
  pages={938-948}
}
Wireless sensor network (WSN) is an important part of the Internet of Things (IoT) and technical support for ubiquitous communication. Data aggregation technology reduces the network traffic overhead and extends the effective working time of the network, but the continued operation of the wireless sensor networks will increase the probability of the aggregation node being captured and probability of the aggregated data being tampered. Thus it will seriously affect the security performance of… 
4 Citations

Figures and Tables from this paper

Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network
TLDR
SSEKMS is a dynamic key management system that also supports the inclusion of the new node and refreshes the keys as per requirements, and compared it with other existing schemes.
A Pre-assigned Key Management Scheme for Heterogeneous Wireless Sensor Networks
TLDR
Simulation results show that, compared with traditional key management scheme, the proposed scheme can not only enhance the network security but reduce the storage requirements.
Variable-Length Key Implementation Based on Complex Network WSN Clustering
TLDR
It is proposed to generate a variable-length random key to manage the relationship between the nodes to ensure that the complex relationship betweenThe node changes and the security of the entire network, and provide an easy-to-implement variable security management mechanism.
A novel image encryption algorithm based on LFT based S-boxes and chaos
A novel and efficient image encryption algorithm based on the chaotic system and S-boxes is introduced in this paper, in which an original S-box is produced by linear fractional transformation (LFT)

References

SHOWING 1-10 OF 12 REFERENCES
Secure hierarchical data aggregation in wireless sensor networks
TLDR
This work proposes a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in-network aggregation in wireless sensor networks and proves that the digital signature algorithm which is based on the Elliptic Curve Digital Signature Algorithm is as secure as ECDSA.
Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis
  • Vimal Kumar, S. Madria
  • Computer Science
    2012 IEEE 13th International Conference on Mobile Data Management
  • 2009
TLDR
Unlike many other secure data aggregation algorithms which require separate phases for secure aggregation and integrity verification, the secure hierarchical data aggregation algorithm does not require an additional phase for verification and saves energy by avoiding additional transmissions and computational overhead on the sensor nodes.
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks
TLDR
The proposed scheme aggregates not only ciphertexts but also signatures and through verifying aggregated signature, data integrity of each plaintext can be guaranteed and the communication overhead for each cluster head is still constant.
Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU
TLDR
The security and performance analysis show that the proposed mechanism based on chameleon hashing and HMAC to do identity verification and message authentication under the environment without RSU is secure and its performance is more superior than the related works.
A Survey on Intelligent Sensor Network and Its Applications
TLDR
This paper reviews the works that are related to intelligent sensor network and group them into two categories, to solve WSN issues with intelligent algorithms and to design an intelligent application that incorporates sensor networks as the data sources.
An Energy-based Cluster Head Selection Algorithm to Support Long-lifetime in Wireless Sensor Networks
TLDR
A novel scheme of an energy-based cluster head selection algorithm (ECHA) to support long-lifetime in WSNs is proposed to improve the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol.
Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach
TLDR
A framework to evaluate network dependability and performability in the face of challenges is presented and it is shown that the impact of network challenges depends on the duration, the number of network elements in a challenged area, and the importance of the nodes in a challenge area.
A Distributed Framework for Correlated Data Gathering in Sensor Networks
TLDR
A new distributed framework to achieve minimum energy data gathering while considering all of the following factors: distributed implementation; capacity and interference associated with the shared medium; and realistic data correlation model is proposed.
A Compact Articial Bee Colony Optimization for Topology Control Scheme in Wireless Sensor Networks
TLDR
The experimental shows that the proposed cABC method is not only as accurate as the existing original Articial Bee Colony optimization but also requires less calculative time than the origi- nal method and uses a modest memory with only six agents needed for storing space.
Collection and aggregation protocol on high efficiency and energy saving of sensor network data
  • Journal of software, vol. 16, no. 12. pp. 2106-2116
  • 2012
...
...