Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem
Abstract
Full Text:
PDFReferences
S. Ozdemir and Y. Xiao, “Secure data aggregation in
Wireless sensor networks : a comprehensive overview,” Computer
Networks, Vol. 53, No.12, pp. 2022–2037, Aug.2009.
K. Akkaya, M. Demirbas and R.S. Aygun, “The Impact of Data
Aggregation on the Performance of Wireless Sensor Networks”,
Wiley Wireless Communication and Mobile Computing (WCMC)
Journal, Vol. 8, pp. 171–193, 2008.
M. Elhoseny, H. Elminir, A. Riad and X. Yuan, “A secure data
routing schema for WSN using elliptic curve cryptography and
homomorphic encryption,” Journal King Saud university, Computer
and Information Science, Vol. 26, No. 3, pp. 262–275, 2015.
J. Boga, M. S. Huque1 and S. B. Saheb, “An Approach to Secure
Data Aggregation in Curve Cryptography) Scheme,” International
Journals of Advanced Research in Computer Science and Software
Engineering, Vol. 7, No. 7, pp. 263–267, 2017.
M. B. Omar Rafik and F. Mohammed, “Fast and secure
implementation of ECC-based concealed data aggregation in WSN,”
Global Information Infrastructure Symposium. GIIS, Toronto, pp.
–7, 2013.
Q. Zhou, G. Yang and L. He, “A secure enhanced data aggregation
based on ECC in wireless sensor network,” Sensor Journal, Vol. 14,
No. 4, pp. 6701–6721, 2014.
Ara M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan, “A Secure Privacy-
Preserving Data ggregation Scheme Based on Bilinear ElGamal
Cryptosystem for Remote Health Monitoring Systems,” IEEE
Access, Vol. 5, pp. 12601–12617, 2017.
D. Boneh, C. Gentry, B. Lynn and H. Shacham, “Aggregate and
verifiably encrypted signatures from bilinear maps,” Proceedings of
EUROCRYPT 2003, Vol. 2656 of LNCS. Springer, Boston, MA, USA,
pp. 416–432, 2003.
J. L. Tsai, “A New Efficient Certificate less Short Signature Scheme
Using Bilinear Pairings,” IEEE Systems Journal, Vol.11, No. 4,
pp. 2395– 2402, Dec.2017.
B.Waters, “Efficient Identity-Based Encryption without Random
Oracles,” Springer Berlin Heidelberg Berlin, Heidelberg,
pp. 114– 127, 2005.
C. Jie, S. Lili, Z. Hong, X. Yan and L Lu, “Data aggregation with end-
to-end confidentiality and integrity for large-scale wireless sensor
networks,” Peer-to-Peer Networking Applications, Vol.11, No.5,
pp. 1022–1037, 2018.
J. Jose, J. Jose, and H. Muhammed Ilyas, “Symmetric concealed
data aggregation techniques in wireless sensor networks using
Privacy Homomorphism: A review,” International Conference on
Information Science (ICIS), pp. 275–280, 2016.
K. Parmar, C. Devesh and Jinwala, “Symmetric-Key Based
Homomorphic Primitives for End-to-End Secure Data Aggregation in
Wireless Sensor Networks,” Journal of Information Security Vol. 6,
pp.38–50, 2015.
K. Shah and D. C. Jinwala, “A secure expansive aggregation in
Wireless Sensor Networks for linear infrastructure,” IEEE Region 10
Symposium (TENSYMP), pp. 207–212, 2016.
E. Choudhari, K. D. Bodhe and S. M. Mundada, “Secure data
aggregation in WSN using iterative filtering algorithm,”
International Conference on Innovative Mechanisms for Industry
Applications (ICIMIA). pp. 1–5, 2017.
M. Mansouri, L. Khoukhi, H. Nounou and M. Nounou, “Secure and
robust clustering for uantized target tracking in wireless sensor
networks,” Journal of Communications and Networks, Vol. 15,
No. 2, pp. 164–172, 2013.
G. Priyanka, Padmane and K. G. Bagde, “Secure Data Aggregation
in Wireless Sensor Network using BECAN Scheme,” International
Journal of Advanced Research in Computer and Communication
Engineering, Vol. 4, No. 10, pp. 205–209, 2015.
S. Nath, P. B. Gibbons, S. Seshan and Z. R. Anderson, “Synopsis
Diffusion for Robust Aggregation in Sensor Networks,” Proceedings
of the 2nd International Conference on Embedded
Networked Sensor Systems (SenSys ’04), ACM, New York, NY,
USA, pp. 250–262, 2004.
S. Roy, M. Conti, S. Setia and S. Jajodia, “Secure Data Aggregation
in Wireless Sensor Networks: Filtering out the Attacker’s Impact,”
IEEE Transactions on Information Forensics and Security, Vol. 9,
No. 4, pp. 681–694, , 2014.
B. Przydatek, D. Song, and A. Perrig, “Secure information
aggregation in sensor networks,” Proceedings of ACM SenSys, ACM,
Los Angeles, CA, USA, pp. 255–265, 2003.
R. Dian-xu, Z. Xiao-Guang and Li Li-jun, “Safety Data Fusion
Algorithm in Wireless Sensor Network, Journal of Networks, Vol. 8,
No. 5, pp. 1121–1129, 2013.
J. Grossschadl, “The Chinese Remainder Theorem and its
application in a high-speed RSA crypto chip,” Computer Security
Applications, ACSAC, 16th Annual Conference. pp. 384–393, 2000.
Y. Mo and S. Li, “Base Extent Optimization for RNS Montgomery
Algorithm,” IEEE Trustcom/BigDataSE/ICESS, PP. 1004–1009,
N. Shi, Z. Hou, M. Tan, K. Shao and X. Zhu, “A threshold encryption
scheme without a dealer based on Chinese remainder theorem,”
IEEE 9th International Conference on Communication Software and
Network ICCSN), PP. 90–96, 2017.
W. Stalling (2010), “Cryptography and Network Security : Principles
and Practices(3rd. ed.)”, Prentice-Hall, NJ, USA, 2019.
V. Kumar and N. Srivastava, “Chinese Remainder Theorem based
Full Homomorphic Encryption over Integers,” International Journal
of Applied Engineering Research (ISSN0973-4562), Vol. 14, No. 2,
(Special Issue), pp. 203-208.
Y.H. Ku and X. Sun, “The Chinese remainder theorem,” Journal
Franklin Institute, Vol. 329, pp. 93–97, 1992.
D. E. Knuth, Semi-numerical Algorithms (3rd ed.), The Art of
Computer Programming,” Vol.2. Addison-Wesley, Reading, MA,
X. Zheng, C.T. Huang and M. Matthews, “Chinese remainder
theorem based group key management,” Proceedings of the 45th
annual southeast regional conference. ACM–SE45, New York, NY,
pp. 266–271, 2007.
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences
eISSN: 2300-1933