Conglomerate Energy Efficient Elgamal Encryption Based Data Aggregation Cryptosystems in Wireless Sensor Network

Document Type : Original Article

Authors

a Department of Computer Applications, Vels Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, India

Abstract

Wireless sensor networks (WSN) are growing rapidly since the past decade mainly due to its efficiency and Ad-Hoc feature. The data aggregation has been extensively employed in WSN that also impact on the data transferring between the sensor nodes. The security issues, data integrity and confidentiality become vital during the deployment of sensor network in a hostile environment. The entire network comprises of sensors, base stations, gateways and nodes which are connected for the purpose of digital transmission. Many existing works have been evolved to address the security issues in WSN but all focused only on basic security features but lack to obtain reliable and effective results in terms of parameters like energy consumption, packet delivery ratio, and computational cost. This paper focussed on the primary research area of data aggregation and the mode of transmission in an energy efficient way without congestion. To obtain the objective, an integration of Conglomerate ElGamal energy efficient protocol has been employed and the performance of the proposed system are evaluated. Since the resource constraint nodes of the wireless sensor network requires less energy to cope up with limited battery power, the main purpose of the work is to build an efficient security mechanism that enhances the performance of the network with less energy, minimum delay, and maximum throughput. The performance parameters like packet delivery ratio, throughput, estimation of alive nodes and dead nodes for different rounds has been performed in the study. Furthermore, the effectiveness of the proposed system has been compared with state of art methods in terms of residual energy and depicted that deliberates the superior performance of the presented framework

Keywords

Main Subjects


  1. Khan, T., Singh, K.J.J.o.D.M.S. and Cryptography, "Resource management based secure trust model for wsn", Journal of Discrete Mathematical Sciences and Cryptography Vol. 22, No. 8, (2019), 1453-1462, doi: 10.1080/09720529.2019.1695897
  2. Alkalbani, A.S. and Mantoro, T., "Security comparison between dynamic & static wsn for 5g networks", in 2017 Second International Conference on Informatics and Computing (ICIC), IEEE. (2017), 1-4.
  3. Mosavvar, I. and Ghaffari, A.J.W.P.C., "Data aggregation in wireless sensor networks using firefly algorithm", Wireless Personal Communications Vol. 104, No. 1, (2019), 307-324, doi: 10.1007/s11277-018-6021-x
  4. Hayouni, H., Hamdi, M.J.I.A. and Computing, S., "A data aggregation security enhancing scheme in wsns using homomorphic encryption", Intelligent Automation & Soft Computing, (2017), 1-9, doi: 10.1080/10798587.2017.1327157
  5. Randhawa, S. and Jain, S.J.W.P.C., "Data aggregation in wireless sensor networks: Previous research, current status and future directions", Wireless Personal Communications Vol. 97, No. 3, (2017), 3355-3425, doi: 10.1007/s11277-017-4674-5
  6. Suriya Praba, T., Meena, V., Sethukarasi, T., Prachetha, K., Aravind, B., Bharathkumar, K.J.J.o.I. and Systems, F., "Energy measure cluster based concealed aggregation for confidentiality and integrity in wsn", Journal of Intelligent & Fuzzy Systems Vol. 38, No. 5, (2020), 6475-6482, doi: 10.3233/JIFS-179728
  7. Vidhya, S., Sasilatha, T.J.J.o.C. and Nanoscience, T., "Performance analysis of ad-hoc on demand distance vector and energy power consumption aodv in wireless sensor networks", Journal of Computational and Theoretical Nanoscience Vol. 14, No. 3, (2017), 1265-1270, doi: 10.1166/jctn.2017.6442
  8. Sowmyadevi, D. and Karthikeyan, K., "Merkle-hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks", in 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), IEEE. (2017), 1-8.
  9. Ara, A., Al-Rodhaan, M., Tian, Y. and Al-Dhelaan, A.J.I.A., "A secure privacy-preserving data aggregation scheme based on bilinear elgamal cryptosystem for remote health monitoring systems", Vol. 5, (2017), 12601-12617, doi: 10.1109/ACCESS.2017.2716439
  10. Wang, Z., Ding, H., Li, B., Bao, L. and Yang, Z.J.I.A., "An energy efficient routing protocol based on improved artificial bee colony algorithm for wireless sensor networks",  Vol. 8, (2020), 133577-133596, doi: 10.1109/ACCESS.2020.3010313
  1. Agarkar, A.A., Karyakarte, M. and Agrawal, H., "Post quantum security solution for data aggregation in wireless sensor networks", in 2020 IEEE Wireless Communications and Networking Conference (WCNC), IEEE. (2020), 1-8.
  2. Hamza, A.H. and Al-Alak, S.M.K., "Evaluation key generator of multiple asymmetric methods in wireless sensor network (wsns)", in Journal of Physics: Conference Series, IOP Publishing. Vol. 1804, No. 1, (2021), 012096.
  3. Wang, H., Chen, Y. and Dong, S.J.I.W.S.S., "Research on efficient-efficient routing protocol for wsns based on improved artificial bee colony algorithm", Vol. 7, No. 1, (2017), 15-20, doi: 10.1049/iet-wss.2016.0006
  4. Leelavathi, G., Shaila, K., Venugopal, K.J.I.J.o.V.I. and Systems, C., "Reconfigurable hardware architecture of public key crypto processor for vanet and wireless sensor nodes", International Journal of Vehicle Information and Communication Systems Vol. 5, No. 1, (2020), 11-25, doi: 10.1504/IJVICS.2020.107179
  5. Chikh, A., Lehsaini, M.J.C., Practice, C. and Experience, "Combination of greedy and compass approaches for efficient multipath geographic routing in wireless multimedia sensor networks", Online First, (2021), e6703, doi: 10.1002/cpe.6703
  6. Li, X., Chen, D., Li, C. and Wang, L.J.S., "Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks", Vol. 15, No. 7, (2015), 15952-15973, doi: 10.3390%2Fs150715952
  7. Prabu, J., "An energy efficient secure data aggregation in wireless sensor networks", (2021), doi: 10.21203/rs.3.rs-364741/v1
  8. Al-naamee, M.K., Ali, S.M.J.B.o.E.E. and Informatics, "Improved el gamal public key cryptosystem using 3d chaotic maps", Bulletin of Electrical Engineering and Informatics Vol. 10, No. 1, (2021), 404-411, doi: 10.11591/eei.v10i1.2124
  9. Maheshwari, P., Sharma, A.K. and Verma, K.J.A.H.N., "Energy efficient cluster based routing protocol for wsn using butterfly optimization algorithm and ant colony optimization", Ad Hoc Networks Vol. 110, (2021), 102317, doi: 10.1016/j.adhoc.2020.102317
  10. Talebi, Z. and Timarchi, S.J.I.J.o.E., "Improved distributed particle filter architecture with novel resampling algorithm for signal tracking", ”, International Journal of Engineering, Transactions C: Aspects, Vol. 33, No. 12, (2020), 2482-2488, doi: 10.5829/ije.2020.33.12c.07
  11. Bypour, H., Farhadi, M. and Mortazavi, R.J.I.J.o.E., "An efficient secret sharing-based storage system for cloud-based internet of things", , International Journal of Engineering, Transactions B: Applications Vol. 32, No. 8, (2019), 1117-1125, doi: 10.5829/ije.2019.32.08b.07