Skip to main content

Advertisement

Log in

VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The various application in Wireless Sensor Networks fascinated towards minimal and secure data transmission. In this paper, VEDSDA protocol is proposed to achieve reduction of data redundancy, data length and providing security for data transmission. The VEDSDA protocol used compression technique to reduce data length which helps to utilize less energy consumption. The data compression technique involves leveling, encoding and decoding phases. Levelling phase converts data to logical data where as encoding phase compress the data size at the source node and decoding phase decompress the data size at the destination. The voronoi diagram concept is used to encrypt and decrypt aggregated data. Thus, VEDSDA protocol is compared with existing protocol and proves better enhancement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Karthik, S., & Ashok Kumar, Dr. A. (2015). Challenges of wireless sensor networks and issues associated with time synchronization. In Proceedings of advanced networking and applications (pp. 2402–2406).

  2. Alotaibi, M. (2014). Security to wireless sensor networks against malicious attacks using hamming residue method. EURASIP Journal on Wireless Communications and Networking, 25(3), 750–761.

    MathSciNet  Google Scholar 

  3. Gupta, M., Gao, J., Yan, X., Cam, H., & Han, J. (2014). Top-K interesting subgraph discovery in information networks. In TInternational council for open and distance education (ICDE) conference (pp. 820–831).

  4. Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel Distribution System, 25(3), 750–761.

    Article  Google Scholar 

  5. Krishnan, A. M., & Kumar, P. G. (2015). An effective clustering approach with data aggregation using multiple mobile sinks for heterogeneous WSN. IEEE Transactions on Parallel Distribution system, 20(2), 423–424.

    Google Scholar 

  6. Nguyen, M. T., Teague, K. A., & Rahnavard, N. (2016). CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing blockwise compressive sensing. Computer Networks, 106, 171–185.

    Article  Google Scholar 

  7. Abirami, T., & Anandamurugan, S. (2015). Data aggregation in wireless sensor network using shuffled frog algorithm. Wireless Personal Communications, 90(2), 1–13.

    Google Scholar 

  8. Bojan, S., & Nikola, Z. (2013). Genetic algorithm as energy optimization method in WSN, on Telecommunications Forum (TELFOR) (pp. 97–100).

  9. Kandukuri, S., Lebreton, J., Murad, N., Lorion, R., & Genon-Catalot, D. (2016). Data window aggregation techniques for energy saving in wireless sensor networks. In IEE symposium on computers and communication (ISCC) (pp. 226–231).

  10. He, D., Kumar, N., & Lee, J. H. (2016). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, 22(2), 491–501.

    Article  Google Scholar 

  11. Hiker, A., Cerqueira, E., Curado, M., & Monteiro, E. (2016). A two-tier adaptive data aggregation approach for M2M group communication. IEEE Sensors Journal, 16(3), 823–835.

    Article  Google Scholar 

  12. Jiang, M., Fu, A., & Wong, R. (2015). Exact Top-k nearest keyword search in large networks, In Proceedings of the 2015 ACM SIGMOD international conference on management of data—SIGMOD ’15 (pp. 393–404).

  13. Castelluccia, C., Chan, A., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–36.

    Article  Google Scholar 

  14. Costa, D. G., Figueredo, S., & Oliveira, G. (2017). Cryptography in wireless multimedia sensor networks: A survey and research directions. International Journal of Cryptography, 1(4), 1–18.

    Google Scholar 

  15. Castellucia, C., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure data aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–35.

    Article  Google Scholar 

  16. Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks, In The second annual international conference on mobile and ubiquitous systems: Networking and services (pp. 109–117).

  17. Acharya, M., Girao, J., & Westhoff, D. (2005). Secure comparison of encrypted data in wireless sensor networks. Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’05), 1(22), 47–53.

    Article  Google Scholar 

  18. Xu, C., Lu, R., Wang, H., Zhu, L., & Huang, C. (2017). PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors, 17(3), 1–18.

    Article  Google Scholar 

  19. Fu, Z., Sun, X., & Ji, S. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. In IEEE INFOCOM 2016—The 35th annual ieee international conference on computer communications (pp. 20–29).

  20. Damodar Reddy, E., & Prasantha, K Jana. (2012). Clustering biological data using voronoi diagram. In Proceedings of ADOCNS 2011 (pp. 188–197).

  21. Kalyani, S. N., & Kumar, S. S. (2015). Energy efficient data aggregation using voronoi diagram. In Proceedings of internal conference on signal processing and communication (pp. 10–13).

  22. Vamsi, P. R., & Kant, K. (2015). Secure data aggregation and intrusion detection in wireless sensor networks. In Proceedings of internal conference on signal processing and communication (pp. 10–13).

  23. Annapurna, H. S., & Siddappa, M. (2015). Secure data aggregation with fault tolerance for wireless sensor networks. In International conference on emerging research in electronics, computer science and technology (pp. 252–258).

  24. Razaque, A., & Rizvib, S. S. (2017). Secure data aggregation using access control and authentication for wireless sensor networks. Computers and Society, 70, 532–545.

    Google Scholar 

  25. Mahimkar, A., & Rappapart, T. S. (2004). ‘ecureDAV: A secure data aggregation and verification protocol for sensor networks. In Proceedings of IEEE global telecommunications conference (pp. 2175–2179).

  26. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 681–694.

    Google Scholar 

  27. Cam, H., Ozdemir, S., Nair, P., & Muthuavinashiappan, D. (2003). ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks. In Proceedings of IEEE sensors (pp. 732–736).

  28. Sonli, H. O., Ozdemir, S., & Cam, H. (2004). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In Proceedings of IEEE\(60_th\)vehicular technology conference (pp. 4650–4654).

  29. Ozdemir, S., & Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.

    Article  Google Scholar 

  30. Ozdemir, S., & Cam, H. (2010). Integrity of false data detection with data aggregation and confidentiality transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.

    Article  Google Scholar 

  31. Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.

    Article  Google Scholar 

  32. Zhang, P., Wang, J., Guo, K., Wu, F., & Min, G. (2018). Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Networks, 69, 86–99.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Reshma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reshma, S., Shaila, K. & Venugopal, K.R. VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs. Wireless Pers Commun 119, 2675–2694 (2021). https://doi.org/10.1007/s11277-021-08351-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08351-0

Keywords

Navigation