The smart grid significantly improves the reliability, efficiency, security, and sustainability of electricity services. It plays an important role in modern energy infrastructure. A drawback of this new technique, ho...
详细信息
The smart grid significantly improves the reliability, efficiency, security, and sustainability of electricity services. It plays an important role in modern energy infrastructure. A drawback of this new technique, however, is that the fine-grained metering data may leak private customer information. Thus, various public-key based data aggregation protocols for privacy protection have been proposed. However, the National Institute of Standards and Technology has recommended not using public-key based cryptography in the smart grid, since maintaining the public-key infrastructure is a heavy cost. In this paper, we propose an identity-based data aggregation protocol for the smart grid, which cannot only prevent unauthorized reading and fine-grained analyzing but can also protect against unintentional errors and maliciously altered messages. The basic building block of our protocol is an identity-based encryption and signature scheme in which an identity-based encryption scheme is combined with an identity-based signature scheme. They share the same private/public parameters, which greatly reduces the complexity of the protocol in the smart grid. Security analysis demonstrates the effectiveness of our protocol in the context of six typical attacks against the smart grid. A prototype implementation based on the Intel Edison platform shows that our protocol is efficient enough for physically constrained smart grid operators, such as smart meters.
The energy is the most critical resource in wireless sensor networks. Many energy efficient techniques have been studied especially in communication protocol. Among these protocols, PEGASIS proposed by Lindsey is the ...
详细信息
ISBN:
(纸本)9780769534718
The energy is the most critical resource in wireless sensor networks. Many energy efficient techniques have been studied especially in communication protocol. Among these protocols, PEGASIS proposed by Lindsey is the most superior in terms of energy efficiency. In PEGASIS, all sensor nodes aggregate and transmit data along the single chain. However this single chain causes some problems such as delay, unexpected long transmission and non-directional transmission to the sink. To resolve delay problem, PEGASIS cuts the chain into several chains. In this way, the delay can be decreased but there is new problem, wireless interference. In this paper, we propose a new chain construction algorithm to resolve above problems. The proposed algorithm minimizes the delay without the wireless interferences and maximizes the energy efficiency by removing the non-directional transmission when transmitting packets to the sink node on wireless sensor networks. Our simulation results show that our proposed algorithm can minimize the delay without expense of energy consumption.
In Wireless Sensor Networks, during data fragmentation, there are chances for dropping some blocks and injecting forged data by the attackers. So the integrity of these fragmented blocks and correctness of data, need ...
详细信息
In Wireless Sensor Networks, during data fragmentation, there are chances for dropping some blocks and injecting forged data by the attackers. So the integrity of these fragmented blocks and correctness of data, need to be verified. Also, DoS attacks needs to be prevented. In order to consider the above points, we proposed a design trust based data aggregation protocol using data validation and integrity verification in WSN. In this protocol, aggregation tree is formed by using the trust value which is evaluated for each node based on the trust features and the sensed data is encrypted with the shared symmetric key. Then the encrypted data are fragmented and signed with homomorphic MAC tag. Once the signed blocks are received, the aggregator performs SUM aggregation function after checking the correctness of data and verifying integrity of each block. The aggregated result is then transmitted to the sink, where it is again verified by the sink. This process is repeated by each sensor for the sensed results. By comparing the values obtained by simulation, we exhibit that the presented technique improves the data correctness.
The notion of aggregator oblivious (AO) security for privacy preserving dataaggregation was formalized with a specific construction of AO-secure blinding technique over a cyclic group by Shi et al. Some of proposals ...
详细信息
The notion of aggregator oblivious (AO) security for privacy preserving dataaggregation was formalized with a specific construction of AO-secure blinding technique over a cyclic group by Shi et al. Some of proposals of data aggregation protocols use the blinding technique of Shi et al. for BGN cryptosystem, an additive homomorphic encryption. Previously, there have been some security analysis on some of BGN based data aggregation protocols in the context of integrity or authenticity of data. Even with such security analysis, the BGN cryptosystem has been a popular building block of privacy preserving data aggregation protocol. In this paper, we study the privacy issues in the blinding technique of Shi et al. used for BGN cryptosystem. We show that the blinding techniques for the BGN cryptosystem used in several protocols are not privacy preserving against the recipient, the decryptor. Our analysis is based on the fact that the BGN cryptosystem uses a pairing e : G x G -> G(T) and the existence of the pairing makes the DDH problem on G easy to solve. We also suggest how to prevent such privacy leakage in the blinding technique of Shi et al. used for BGN cryptosystem.
In order to conserve wireless sensor network (WSN) lifetime, dataaggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secu...
详细信息
ISBN:
(纸本)9788996865032
In order to conserve wireless sensor network (WSN) lifetime, dataaggregation is applied. Some researchers consider the importance of security and propose secure data aggregation protocols. The essential of those secure approaches is to make sure that the aggregators aggregate the data in appropriate and secure way. In this paper we give the description of ESPDA (Energy-efficient and Secure Pattern-based dataaggregation) and SRDA (Secure Reference-Based dataaggregation) protocol that work on cluster-based WSN and the deep security analysis that are different from the previously presented one.
In-network dataaggregation is a promising communication mechanism to reduce bandwidth requirements of applications in vehicular ad-hoc networks (VANETs). Many aggregation schemes have been proposed, often with varyin...
详细信息
In this review, the current applications of wireless sensor networks (WSNs) in the agriculture field classify and compare various wireless protocols such as ZigBee wireless protocol, Bluetooth (BT) wireless protocol, ...
详细信息
In this review, the current applications of wireless sensor networks (WSNs) in the agriculture field classify and compare various wireless protocols such as ZigBee wireless protocol, Bluetooth (BT) wireless protocol, Wi-Fi wireless protocol, long range radio (LoRa) protocol, SigFox protocol, flat routing protocol, hierarchical routing protocol and GPRS/3G/4G/5G/6G technology employed for agricultural monitoring systems-based WSNs. Several energy efficiency and agricultural management strategies of long-term monitoring are emphasised, with an examination of the difficulties and constraints faced by WSNs in the agricultural sector. These techniques may maximise the chances for processing IoT information. Therefore, a detailed statistical analysis is provided in this review which, was conducted by extracting information published from 2018 to 2023. Additionally, the research challenges in smart agriculture applications are analysed and solutions for those challenges are provided. Finally, this survey is helpful for researchers to enhance the quantity of IoT data processing opportunities.
In IoT infrastructure, high-frequency sensing and subsequent transmission of sensed data to computational facilities can lead to redundant data storage and processing, consuming significant storage and processing capa...
详细信息
In IoT infrastructure, high-frequency sensing and subsequent transmission of sensed data to computational facilities can lead to redundant data storage and processing, consuming significant storage and processing capacity. As a result, the IoT infrastructure needs more data transmission cycles, leading to data redundancy and low network up-time due to the drainage of limited battery capacity. Conversely, if the data is communicated at a lower rate, it may cause absolute data delivery to the processing unit, which is useless. As a result, a well-designed dataaggregation algorithm is required. This paper proposes the ADA2 2 - IoT, , an Adaptive dataaggregation Algorithm for IoT Infrastructure tailored to optimize parameters such as low data redundancy, limited data communication cycles, and high IoT infrastructure up times. The proposed algorithm consists of two key components: the Route data Aggregator (RDA) performs aggregation during data transit towards the Edge node or gateway, and the Node data Aggregator (NDA) performs dataaggregation during capturing or sensing data. The algorithm employs metrics like Age of Information (AoI) and data freshness factor during the node and route dataaggregation phase to capture and timely deliver data to the Edge node, where this data is processed for informed decision-making. The proposed algorithm was efficiently tested on a simulation and IoT hardware deployment environment. Both simulation and hardware results demonstrate a substantial improvement in QoS parameters, such as a decrease in data redundancy and packet exchanges, leading to considerable energy savings and prolonging the lifespan of IoT infrastructure.
暂无评论