2019
DOI: 10.1177/1550147719856516
|View full text |Cite
|
Sign up to set email alerts
|

A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks

Abstract: Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing-based data collection scheme for distributed wireless sensor network. It adopted public key cryptography technology to solve the key distribution problem, and compressive sensing over finite fields to reduce the communication cost of data collection. Under hardness of decisional learning with errors problem on lattice, it can ensure indistinguishability a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In the CS schemes [ 33 , 47 – 50 ], the Encryption overload is expressed as M / N . It is equal to M /( N − k ) for [ 47 ], and for Public key based schemes of [ 52 ] and [ 51 ], it is given by Mk H / N , where k H denotes the key size of additive homomorphism algorithm adopted in them and | R |/ N + 2 M ( log 2 q + 1)/ n , where q , R represents the prime power used for encryption and Cipher-Text expansion, respectively.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In the CS schemes [ 33 , 47 – 50 ], the Encryption overload is expressed as M / N . It is equal to M /( N − k ) for [ 47 ], and for Public key based schemes of [ 52 ] and [ 51 ], it is given by Mk H / N , where k H denotes the key size of additive homomorphism algorithm adopted in them and | R |/ N + 2 M ( log 2 q + 1)/ n , where q , R represents the prime power used for encryption and Cipher-Text expansion, respectively.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Based on the previous calculations, we may infer that the CS scheme has the lowest communication cost, but does not provide adequate performance with respect to security concerns. However, in the proposed scheme, the public key is only used by the CHs, rather than by all nodes as in other schemes [ 51 , 52 ]. Because of this, the Encryption overhead of our technique is less than the others, which reduces the communication cost.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this way, sensor nodes can complete data collection in a compressed manner without additional computational overhead. For the wireless sensor network, although it has the characteristics of convenient construction, strong adaptability, and high transmission efficiency, there are some limitations in some aspects, such as energy supply, sensor life cycle, delay, bandwidth, signal distortion, and transmission cost [36][37][38][39][40][41][42][43].…”
Section: Introductionmentioning
confidence: 99%