Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

27.05.2021

VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs

verfasst von: S. Reshma, K. Shaila, K. R. Venugopal

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The various application in Wireless Sensor Networks fascinated towards minimal and secure data transmission. In this paper, VEDSDA protocol is proposed to achieve reduction of data redundancy, data length and providing security for data transmission. The VEDSDA protocol used compression technique to reduce data length which helps to utilize less energy consumption. The data compression technique involves leveling, encoding and decoding phases. Levelling phase converts data to logical data where as encoding phase compress the data size at the source node and decoding phase decompress the data size at the destination. The voronoi diagram concept is used to encrypt and decrypt aggregated data. Thus, VEDSDA protocol is compared with existing protocol and proves better enhancement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Karthik, S., & Ashok Kumar, Dr. A. (2015). Challenges of wireless sensor networks and issues associated with time synchronization. In Proceedings of advanced networking and applications (pp. 2402–2406). Karthik, S., & Ashok Kumar, Dr. A. (2015). Challenges of wireless sensor networks and issues associated with time synchronization. In Proceedings of advanced networking and applications (pp. 2402–2406).
2.
Zurück zum Zitat Alotaibi, M. (2014). Security to wireless sensor networks against malicious attacks using hamming residue method. EURASIP Journal on Wireless Communications and Networking, 25(3), 750–761.MathSciNet Alotaibi, M. (2014). Security to wireless sensor networks against malicious attacks using hamming residue method. EURASIP Journal on Wireless Communications and Networking, 25(3), 750–761.MathSciNet
3.
Zurück zum Zitat Gupta, M., Gao, J., Yan, X., Cam, H., & Han, J. (2014). Top-K interesting subgraph discovery in information networks. In TInternational council for open and distance education (ICDE) conference (pp. 820–831). Gupta, M., Gao, J., Yan, X., Cam, H., & Han, J. (2014). Top-K interesting subgraph discovery in information networks. In TInternational council for open and distance education (ICDE) conference (pp. 820–831).
4.
Zurück zum Zitat Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel Distribution System, 25(3), 750–761.CrossRef Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel Distribution System, 25(3), 750–761.CrossRef
5.
Zurück zum Zitat Krishnan, A. M., & Kumar, P. G. (2015). An effective clustering approach with data aggregation using multiple mobile sinks for heterogeneous WSN. IEEE Transactions on Parallel Distribution system, 20(2), 423–424. Krishnan, A. M., & Kumar, P. G. (2015). An effective clustering approach with data aggregation using multiple mobile sinks for heterogeneous WSN. IEEE Transactions on Parallel Distribution system, 20(2), 423–424.
6.
Zurück zum Zitat Nguyen, M. T., Teague, K. A., & Rahnavard, N. (2016). CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing blockwise compressive sensing. Computer Networks, 106, 171–185.CrossRef Nguyen, M. T., Teague, K. A., & Rahnavard, N. (2016). CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing blockwise compressive sensing. Computer Networks, 106, 171–185.CrossRef
7.
Zurück zum Zitat Abirami, T., & Anandamurugan, S. (2015). Data aggregation in wireless sensor network using shuffled frog algorithm. Wireless Personal Communications, 90(2), 1–13. Abirami, T., & Anandamurugan, S. (2015). Data aggregation in wireless sensor network using shuffled frog algorithm. Wireless Personal Communications, 90(2), 1–13.
8.
Zurück zum Zitat Bojan, S., & Nikola, Z. (2013). Genetic algorithm as energy optimization method in WSN, on Telecommunications Forum (TELFOR) (pp. 97–100). Bojan, S., & Nikola, Z. (2013). Genetic algorithm as energy optimization method in WSN, on Telecommunications Forum (TELFOR) (pp. 97–100).
9.
Zurück zum Zitat Kandukuri, S., Lebreton, J., Murad, N., Lorion, R., & Genon-Catalot, D. (2016). Data window aggregation techniques for energy saving in wireless sensor networks. In IEE symposium on computers and communication (ISCC) (pp. 226–231). Kandukuri, S., Lebreton, J., Murad, N., Lorion, R., & Genon-Catalot, D. (2016). Data window aggregation techniques for energy saving in wireless sensor networks. In IEE symposium on computers and communication (ISCC) (pp. 226–231).
10.
Zurück zum Zitat He, D., Kumar, N., & Lee, J. H. (2016). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, 22(2), 491–501.CrossRef He, D., Kumar, N., & Lee, J. H. (2016). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, 22(2), 491–501.CrossRef
11.
Zurück zum Zitat Hiker, A., Cerqueira, E., Curado, M., & Monteiro, E. (2016). A two-tier adaptive data aggregation approach for M2M group communication. IEEE Sensors Journal, 16(3), 823–835.CrossRef Hiker, A., Cerqueira, E., Curado, M., & Monteiro, E. (2016). A two-tier adaptive data aggregation approach for M2M group communication. IEEE Sensors Journal, 16(3), 823–835.CrossRef
12.
Zurück zum Zitat Jiang, M., Fu, A., & Wong, R. (2015). Exact Top-k nearest keyword search in large networks, In Proceedings of the 2015 ACM SIGMOD international conference on management of data—SIGMOD ’15 (pp. 393–404). Jiang, M., Fu, A., & Wong, R. (2015). Exact Top-k nearest keyword search in large networks, In Proceedings of the 2015 ACM SIGMOD international conference on management of data—SIGMOD ’15 (pp. 393–404).
13.
Zurück zum Zitat Castelluccia, C., Chan, A., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–36.CrossRef Castelluccia, C., Chan, A., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–36.CrossRef
14.
Zurück zum Zitat Costa, D. G., Figueredo, S., & Oliveira, G. (2017). Cryptography in wireless multimedia sensor networks: A survey and research directions. International Journal of Cryptography, 1(4), 1–18. Costa, D. G., Figueredo, S., & Oliveira, G. (2017). Cryptography in wireless multimedia sensor networks: A survey and research directions. International Journal of Cryptography, 1(4), 1–18.
15.
Zurück zum Zitat Castellucia, C., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure data aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–35.CrossRef Castellucia, C., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure data aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–35.CrossRef
16.
Zurück zum Zitat Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks, In The second annual international conference on mobile and ubiquitous systems: Networking and services (pp. 109–117). Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks, In The second annual international conference on mobile and ubiquitous systems: Networking and services (pp. 109–117).
17.
Zurück zum Zitat Acharya, M., Girao, J., & Westhoff, D. (2005). Secure comparison of encrypted data in wireless sensor networks. Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’05), 1(22), 47–53.CrossRef Acharya, M., Girao, J., & Westhoff, D. (2005). Secure comparison of encrypted data in wireless sensor networks. Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’05), 1(22), 47–53.CrossRef
18.
Zurück zum Zitat Xu, C., Lu, R., Wang, H., Zhu, L., & Huang, C. (2017). PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors, 17(3), 1–18.CrossRef Xu, C., Lu, R., Wang, H., Zhu, L., & Huang, C. (2017). PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors, 17(3), 1–18.CrossRef
19.
Zurück zum Zitat Fu, Z., Sun, X., & Ji, S. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. In IEEE INFOCOM 2016—The 35th annual ieee international conference on computer communications (pp. 20–29). Fu, Z., Sun, X., & Ji, S. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. In IEEE INFOCOM 2016—The 35th annual ieee international conference on computer communications (pp. 20–29).
20.
Zurück zum Zitat Damodar Reddy, E., & Prasantha, K Jana. (2012). Clustering biological data using voronoi diagram. In Proceedings of ADOCNS 2011 (pp. 188–197). Damodar Reddy, E., & Prasantha, K Jana. (2012). Clustering biological data using voronoi diagram. In Proceedings of ADOCNS 2011 (pp. 188–197).
21.
Zurück zum Zitat Kalyani, S. N., & Kumar, S. S. (2015). Energy efficient data aggregation using voronoi diagram. In Proceedings of internal conference on signal processing and communication (pp. 10–13). Kalyani, S. N., & Kumar, S. S. (2015). Energy efficient data aggregation using voronoi diagram. In Proceedings of internal conference on signal processing and communication (pp. 10–13).
22.
Zurück zum Zitat Vamsi, P. R., & Kant, K. (2015). Secure data aggregation and intrusion detection in wireless sensor networks. In Proceedings of internal conference on signal processing and communication (pp. 10–13). Vamsi, P. R., & Kant, K. (2015). Secure data aggregation and intrusion detection in wireless sensor networks. In Proceedings of internal conference on signal processing and communication (pp. 10–13).
23.
Zurück zum Zitat Annapurna, H. S., & Siddappa, M. (2015). Secure data aggregation with fault tolerance for wireless sensor networks. In International conference on emerging research in electronics, computer science and technology (pp. 252–258). Annapurna, H. S., & Siddappa, M. (2015). Secure data aggregation with fault tolerance for wireless sensor networks. In International conference on emerging research in electronics, computer science and technology (pp. 252–258).
24.
Zurück zum Zitat Razaque, A., & Rizvib, S. S. (2017). Secure data aggregation using access control and authentication for wireless sensor networks. Computers and Society, 70, 532–545. Razaque, A., & Rizvib, S. S. (2017). Secure data aggregation using access control and authentication for wireless sensor networks. Computers and Society, 70, 532–545.
25.
Zurück zum Zitat Mahimkar, A., & Rappapart, T. S. (2004). ‘ecureDAV: A secure data aggregation and verification protocol for sensor networks. In Proceedings of IEEE global telecommunications conference (pp. 2175–2179). Mahimkar, A., & Rappapart, T. S. (2004). ‘ecureDAV: A secure data aggregation and verification protocol for sensor networks. In Proceedings of IEEE global telecommunications conference (pp. 2175–2179).
26.
Zurück zum Zitat Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 681–694. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 681–694.
27.
Zurück zum Zitat Cam, H., Ozdemir, S., Nair, P., & Muthuavinashiappan, D. (2003). ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks. In Proceedings of IEEE sensors (pp. 732–736). Cam, H., Ozdemir, S., Nair, P., & Muthuavinashiappan, D. (2003). ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks. In Proceedings of IEEE sensors (pp. 732–736).
28.
Zurück zum Zitat Sonli, H. O., Ozdemir, S., & Cam, H. (2004). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In Proceedings of IEEE\(60_th\)vehicular technology conference (pp. 4650–4654). Sonli, H. O., Ozdemir, S., & Cam, H. (2004). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In Proceedings of IEEE\(60_th\)vehicular technology conference (pp. 4650–4654).
29.
Zurück zum Zitat Ozdemir, S., & Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.CrossRef Ozdemir, S., & Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.CrossRef
30.
Zurück zum Zitat Ozdemir, S., & Cam, H. (2010). Integrity of false data detection with data aggregation and confidentiality transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.CrossRef Ozdemir, S., & Cam, H. (2010). Integrity of false data detection with data aggregation and confidentiality transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.CrossRef
31.
Zurück zum Zitat Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.CrossRef Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.CrossRef
32.
Zurück zum Zitat Zhang, P., Wang, J., Guo, K., Wu, F., & Min, G. (2018). Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Networks, 69, 86–99.CrossRef Zhang, P., Wang, J., Guo, K., Wu, F., & Min, G. (2018). Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Networks, 69, 86–99.CrossRef
Metadaten
Titel
VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs
verfasst von
S. Reshma
K. Shaila
K. R. Venugopal
Publikationsdatum
27.05.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08351-0

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt