scholarly journals Trust-based Key Management Conglomerate ElGamal Encryption for Data Aggregation Framework in WSN using Blockchain Technology

Author(s):  
T. G. Babu ◽  
V. Jayalakshmi
Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 215
Author(s):  
Lijun Wei ◽  
Jing Wu ◽  
Chengnian Long

Crowdsensing is an emerging paradigm of data aggregation, which has a pivotal role in data-driven applications. By leveraging the recruitment, a crowdsensing system collects a large amount of data from mobile devices at a low cost. The critical issues in the development of crowdsensing are platform security, privacy protection, and incentive. However, the existing centralized, platform-based approaches suffer from the single point of failure which may result in data leakage. Besides, few previous studies have addressed the considerations of both the economic incentive and data quality. In this paper, we propose a decentralized crowdsensing architecture based on blockchain technology which will help improve the attack resistance. Furthermore, we present a hybrid incentive mechanism, which integrates the data quality, reputation, and monetary factors to encourage participants to contribute their sensing data while discouraging malicious behaviors. The effectiveness our of proposed incentive model is verified through a combination of the theory of mechanism design. The performance analysis and simulation results illustrate that the proposed hybrid incentive model is a reliable and efficient mean to promote data security and incentivizing positive conduct on the crowdsensing application.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Songjie Wei ◽  
Shuai Li ◽  
Peilong Liu ◽  
Meilin Liu

LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.


Author(s):  
Soumyashree S Panda ◽  
Debasish Jena ◽  
Bhabendu Kumar Mohanta ◽  
Somula Ramasubbareddy ◽  
Mahmoud Daneshmand ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Ashwag Albakri ◽  
Lein Harn ◽  
Sejun Song

Securing data transferred over a WSN is required to protect data from being compromised by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted between sensor nodes. There are several approaches introduced in the literature for key establishment in WSNs. Designing a key distribution/establishment scheme in WSNs is a challenging task due to the limited resources of sensor nodes. Polynomial-based key distribution schemes have been proposed in WSNs to provide a lightweight solution for resource-constraint devices. More importantly, polynomial-based schemes guarantee that a pairwise key exists between two sensors in the WSNs. However, one problem associated with all polynomial-based approaches in WSNs is that they are vulnerable to sensor capture attacks. Specifically, the attacker can compromise the security of the entire network by capturing a fixed number of sensors. In this paper, we propose a novel polynomial-based scheme with a probabilistic security feature that effectively reduces the security risk of sensor-captured attacks and requires minimal memory and computation overhead. Furthermore, our design can be extended to provide hierarchical key management to support data aggregation in WSNs.


2020 ◽  
Vol 10 (1) ◽  
pp. 5108-5112
Author(s):  
M. B. Apsara ◽  
P. Dayananda ◽  
C. N. Sowmyarani

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.


2021 ◽  
Author(s):  
Jie Xiao

The first design presents a novel location-based key management and en-route data authentication proposal. It divides the whole sensing area into a number of location cells. A group of location cells consist of a logical group. A pairwise key between two sensor nodes is established based on grid-based bivariate t-degree polynomials. Any valid reading report needs to collect enough message authentication code (MACs) from different neighbours. These pairwise keys used for generating the MAC are forwarded several hops down to the base station for future en-route data authentication. The second design proposes a greedy location-based secure and energy-efficient data aggregation approach. It further utilizes data aggregation based on the previous design by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. In addition, different from the first design, it only requires control head nodes to collect enough MACs in each reading report. Extensive analysis, evaluations and experiments show us that both designs are secure, efficient and resilient.


2020 ◽  
Author(s):  
Dominic BUCERZAN ◽  
Crina Anina BEJAN

Sign in / Sign up

Export Citation Format

Share Document