2020
DOI: 10.1109/jiot.2019.2957396
|View full text |Cite
|
Sign up to set email alerts
|

Data Aggregation in Wireless Sensor Networks: From the Perspective of Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 131 publications
0
17
0
Order By: Relevance
“…Here the length of integer part and fractional part of g and h are, L = 2 and K =2 respectively. The corresponding G and H vectors are G = [6,3,7,9] and H = [8,9,6,5]. The ciphertexts generated after encryption using (45) and (46) are, C1 =[ 55, 407,469,315,387,310] and C2 = [-58, 481, 313, 159, 253, 493].…”
Section: Fully Homomorphic Multiplicationmentioning
confidence: 99%
See 1 more Smart Citation
“…Here the length of integer part and fractional part of g and h are, L = 2 and K =2 respectively. The corresponding G and H vectors are G = [6,3,7,9] and H = [8,9,6,5]. The ciphertexts generated after encryption using (45) and (46) are, C1 =[ 55, 407,469,315,387,310] and C2 = [-58, 481, 313, 159, 253, 493].…”
Section: Fully Homomorphic Multiplicationmentioning
confidence: 99%
“…Randhawa and Jain [2] expalined current status and future directions in data aggregation in wireless sensor networks. In [3]- [5], the authors have comprehensively reviewed several secure data aggregation (SDA) schemes which include non-homomorphic as well as homomorphic methods. SDA using homomorphic methods based on matrix keys are described in [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Data aggregation methods were designed for multi-hop transmissions, where intermediate nodes can merge several messages received from neighbouring sensor nodes, and send them towards the sink node as a single packet [7][8][9]. As a result, the number of packets transmitted in the network is reduced.…”
Section: Data Aggregationmentioning
confidence: 99%
“…To reduce costs, manufacturers of sensor-node devices could neglect security. At the same time, sensor nodes are usually deployed in an open environment, which provides convenience for attackers ( Liu et al, 2020 ). WSNs face many security threats, including denial-of-service (DoS) attacks, node capture, malware infection, and others ( Souissi, Ben Azzouna & Ben Said, 2019 ).…”
Section: Introductionmentioning
confidence: 99%