Efficient Sensing of Data when Aggregated with Integrity and Authenticity Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.17485/ijst/2016/v9i3/86384
Background/Objectives: The main objective of this paper is to gather and aggregate data in an efficient manner so that network lifetime is enhanced. Enhanced mechanisms for end-to-end encryption from the sensors to the sink, also termed converge cast traffic, address the concern of reducing both the energy consumption at the sensor nodes and the effect of physical attacks on the nodes. Concealed Data Aggregation provides a good balance between energy-efficiency and security while still allowing data to be processed at the nodes. Methods/Statistical analysis: In this paper, we first outline and discuss the formation of cluster nodes. In these each sensor node is controlled by the Cluster Head (CH) which in turn is controlled by a Base Station (BS). Then, an integrity and authenticity has been enhanced using Mykletun encryption scheme. Findings: To recover, the above issues a novel methodology has been proposed, which provides maximize data integrity and authenticity using Concealed Data Aggregation (CDA). This leads to reduce the transmission overhead and improves the overall lifetime of WSN. Applications/Improvements: We propose a novel approach using homomorphic encryption, Mykletun KeyGen and Boneh Signature Scheme to achieve confidentiality, integrity and availability for secure data aggregation in wireless sensor networks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.17485/ijst/2016/v9i3/86384
- OA Status
- diamond
- Cited By
- 1
- References
- 7
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2263332615
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2263332615Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.17485/ijst/2016/v9i3/86384Digital Object Identifier
- Title
-
Efficient Sensing of Data when Aggregated with Integrity and AuthenticityWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-02-09Full publication date if available
- Authors
-
Gaurav Raj, M Thanjaivadivel, M. Viswanathan, N. BindhuList of authors in order
- Landing page
-
https://doi.org/10.17485/ijst/2016/v9i3/86384Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.17485/ijst/2016/v9i3/86384Direct OA link when available
- Concepts
-
Computer science, Data integrity, Computer securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2016: 1Per-year citation counts (last 5 years)
- References (count)
-
7Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2263332615 |
|---|---|
| doi | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| ids.doi | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| ids.mag | 2263332615 |
| ids.openalex | https://openalex.org/W2263332615 |
| fwci | 0.29853518 |
| type | article |
| title | Efficient Sensing of Data when Aggregated with Integrity and Authenticity |
| biblio.issue | 3 |
| biblio.volume | 9 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11498 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Security in Wireless Sensor Networks |
| topics[1].id | https://openalex.org/T10080 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9977999925613403 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Energy Efficient Wireless Sensor Networks |
| topics[2].id | https://openalex.org/T11800 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9700999855995178 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | User Authentication and Security Systems |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7267283201217651 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C33762810 |
| concepts[1].level | 2 |
| concepts[1].score | 0.527123749256134 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q461671 |
| concepts[1].display_name | Data integrity |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3408272862434387 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7267283201217651 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/data-integrity |
| keywords[1].score | 0.527123749256134 |
| keywords[1].display_name | Data integrity |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.3408272862434387 |
| keywords[2].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.17485/ijst/2016/v9i3/86384 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764746358 |
| locations[0].source.issn | 0974-5645, 0974-6846 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0974-5645 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Indian Journal of Science and Technology |
| locations[0].source.host_organization | https://openalex.org/P4322615647 |
| locations[0].source.host_organization_name | Indian Society for Education and Environment |
| locations[0].source.host_organization_lineage | https://openalex.org/P4322615647 |
| locations[0].source.host_organization_lineage_names | Indian Society for Education and Environment |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Indian Journal of Science and Technology |
| locations[0].landing_page_url | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5069394869 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-9806-5923 |
| authorships[0].author.display_name | Gaurav Raj |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I1330855593 |
| authorships[0].affiliations[0].raw_affiliation_string | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[0].institutions[0].id | https://openalex.org/I1330855593 |
| authorships[0].institutions[0].ror | https://ror.org/05bc5bx80 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I1330855593 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | G. S. Raj |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[1].author.id | https://openalex.org/A5031789935 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | M Thanjaivadivel |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I1330855593 |
| authorships[1].affiliations[0].raw_affiliation_string | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[1].institutions[0].id | https://openalex.org/I1330855593 |
| authorships[1].institutions[0].ror | https://ror.org/05bc5bx80 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I1330855593 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | M. Thanjaivadivel |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[2].author.id | https://openalex.org/A5111464936 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | M. Viswanathan |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I1330855593 |
| authorships[2].affiliations[0].raw_affiliation_string | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[2].institutions[0].id | https://openalex.org/I1330855593 |
| authorships[2].institutions[0].ror | https://ror.org/05bc5bx80 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I1330855593 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | M. Viswanathan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[3].author.id | https://openalex.org/A5024037580 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | N. Bindhu |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I1330855593 |
| authorships[3].affiliations[0].raw_affiliation_string | Vel Tech University, Chennai - 600062, Tamil Nadu |
| authorships[3].institutions[0].id | https://openalex.org/I1330855593 |
| authorships[3].institutions[0].ror | https://ror.org/05bc5bx80 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I1330855593 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | N. Bindhu |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Vel Tech University, Chennai - 600062, Tamil Nadu |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Efficient Sensing of Data when Aggregated with Integrity and Authenticity |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11498 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Security in Wireless Sensor Networks |
| related_works | https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2350741829, https://openalex.org/W2130043461, https://openalex.org/W2530322880 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2016 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.17485/ijst/2016/v9i3/86384 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764746358 |
| best_oa_location.source.issn | 0974-5645, 0974-6846 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0974-5645 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Indian Journal of Science and Technology |
| best_oa_location.source.host_organization | https://openalex.org/P4322615647 |
| best_oa_location.source.host_organization_name | Indian Society for Education and Environment |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4322615647 |
| best_oa_location.source.host_organization_lineage_names | Indian Society for Education and Environment |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Indian Journal of Science and Technology |
| best_oa_location.landing_page_url | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| primary_location.id | doi:10.17485/ijst/2016/v9i3/86384 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764746358 |
| primary_location.source.issn | 0974-5645, 0974-6846 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0974-5645 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Indian Journal of Science and Technology |
| primary_location.source.host_organization | https://openalex.org/P4322615647 |
| primary_location.source.host_organization_name | Indian Society for Education and Environment |
| primary_location.source.host_organization_lineage | https://openalex.org/P4322615647 |
| primary_location.source.host_organization_lineage_names | Indian Society for Education and Environment |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Indian Journal of Science and Technology |
| primary_location.landing_page_url | https://doi.org/10.17485/ijst/2016/v9i3/86384 |
| publication_date | 2016-02-09 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W1994220746, https://openalex.org/W2053191857, https://openalex.org/W2114248007, https://openalex.org/W2072926644, https://openalex.org/W2150865951, https://openalex.org/W2028842569, https://openalex.org/W2163125537 |
| referenced_works_count | 7 |
| abstract_inverted_index.a | 66, 118, 142, 179 |
| abstract_inverted_index.In | 87, 100 |
| abstract_inverted_index.To | 137 |
| abstract_inverted_index.We | 177 |
| abstract_inverted_index.an | 15, 123 |
| abstract_inverted_index.at | 49, 80 |
| abstract_inverted_index.be | 78 |
| abstract_inverted_index.by | 107, 117 |
| abstract_inverted_index.in | 14, 113, 201 |
| abstract_inverted_index.is | 8, 22, 105, 115 |
| abstract_inverted_index.of | 5, 43, 56, 97, 172 |
| abstract_inverted_index.on | 59 |
| abstract_inverted_index.so | 18 |
| abstract_inverted_index.to | 9, 32, 77, 162, 191 |
| abstract_inverted_index.we | 90 |
| abstract_inverted_index.The | 2 |
| abstract_inverted_index.and | 11, 53, 71, 93, 125, 153, 167, 187, 195 |
| abstract_inverted_index.for | 26, 197 |
| abstract_inverted_index.has | 127, 145 |
| abstract_inverted_index.the | 30, 33, 41, 46, 50, 54, 60, 81, 95, 108, 139, 164, 169 |
| abstract_inverted_index.(CH) | 111 |
| abstract_inverted_index.Base | 119 |
| abstract_inverted_index.Data | 63, 157 |
| abstract_inverted_index.Head | 110 |
| abstract_inverted_index.This | 160 |
| abstract_inverted_index.WSN. | 173 |
| abstract_inverted_index.also | 35 |
| abstract_inverted_index.been | 128, 146 |
| abstract_inverted_index.both | 45 |
| abstract_inverted_index.cast | 38 |
| abstract_inverted_index.data | 13, 76, 151, 199 |
| abstract_inverted_index.each | 102 |
| abstract_inverted_index.from | 29 |
| abstract_inverted_index.good | 67 |
| abstract_inverted_index.main | 3 |
| abstract_inverted_index.node | 104 |
| abstract_inverted_index.that | 19 |
| abstract_inverted_index.this | 6, 88 |
| abstract_inverted_index.turn | 114 |
| abstract_inverted_index.(BS). | 121 |
| abstract_inverted_index.Boneh | 188 |
| abstract_inverted_index.Then, | 122 |
| abstract_inverted_index.above | 140 |
| abstract_inverted_index.first | 91 |
| abstract_inverted_index.leads | 161 |
| abstract_inverted_index.nodes | 52 |
| abstract_inverted_index.novel | 143, 180 |
| abstract_inverted_index.paper | 7 |
| abstract_inverted_index.sink, | 34 |
| abstract_inverted_index.still | 74 |
| abstract_inverted_index.these | 101 |
| abstract_inverted_index.using | 130, 155, 182 |
| abstract_inverted_index.which | 112, 148 |
| abstract_inverted_index.while | 73 |
| abstract_inverted_index.(CDA). | 159 |
| abstract_inverted_index.KeyGen | 186 |
| abstract_inverted_index.Scheme | 190 |
| abstract_inverted_index.effect | 55 |
| abstract_inverted_index.energy | 47 |
| abstract_inverted_index.gather | 10 |
| abstract_inverted_index.issues | 141 |
| abstract_inverted_index.manner | 17 |
| abstract_inverted_index.nodes. | 61, 82, 99 |
| abstract_inverted_index.paper, | 89 |
| abstract_inverted_index.reduce | 163 |
| abstract_inverted_index.secure | 198 |
| abstract_inverted_index.sensor | 51, 103, 203 |
| abstract_inverted_index.termed | 36 |
| abstract_inverted_index.Cluster | 109 |
| abstract_inverted_index.Station | 120 |
| abstract_inverted_index.achieve | 192 |
| abstract_inverted_index.address | 40 |
| abstract_inverted_index.attacks | 58 |
| abstract_inverted_index.balance | 68 |
| abstract_inverted_index.between | 69 |
| abstract_inverted_index.cluster | 98 |
| abstract_inverted_index.concern | 42 |
| abstract_inverted_index.discuss | 94 |
| abstract_inverted_index.network | 20 |
| abstract_inverted_index.outline | 92 |
| abstract_inverted_index.overall | 170 |
| abstract_inverted_index.propose | 178 |
| abstract_inverted_index.scheme. | 133 |
| abstract_inverted_index.sensors | 31 |
| abstract_inverted_index.Enhanced | 24 |
| abstract_inverted_index.Mykletun | 131, 185 |
| abstract_inverted_index.allowing | 75 |
| abstract_inverted_index.approach | 181 |
| abstract_inverted_index.converge | 37 |
| abstract_inverted_index.enhanced | 129 |
| abstract_inverted_index.improves | 168 |
| abstract_inverted_index.lifetime | 21, 171 |
| abstract_inverted_index.maximize | 150 |
| abstract_inverted_index.overhead | 166 |
| abstract_inverted_index.physical | 57 |
| abstract_inverted_index.provides | 65, 149 |
| abstract_inverted_index.recover, | 138 |
| abstract_inverted_index.reducing | 44 |
| abstract_inverted_index.security | 72 |
| abstract_inverted_index.traffic, | 39 |
| abstract_inverted_index.wireless | 202 |
| abstract_inverted_index.Concealed | 62, 156 |
| abstract_inverted_index.Findings: | 135 |
| abstract_inverted_index.Signature | 189 |
| abstract_inverted_index.aggregate | 12 |
| abstract_inverted_index.analysis: | 85 |
| abstract_inverted_index.efficient | 16 |
| abstract_inverted_index.enhanced. | 23 |
| abstract_inverted_index.formation | 96 |
| abstract_inverted_index.integrity | 124, 152, 194 |
| abstract_inverted_index.networks. | 204 |
| abstract_inverted_index.objective | 4 |
| abstract_inverted_index.processed | 79 |
| abstract_inverted_index.proposed, | 147 |
| abstract_inverted_index.controlled | 106, 116 |
| abstract_inverted_index.encryption | 28, 132 |
| abstract_inverted_index.end-to-end | 27 |
| abstract_inverted_index.mechanisms | 25 |
| abstract_inverted_index.Aggregation | 64, 158 |
| abstract_inverted_index.aggregation | 200 |
| abstract_inverted_index.consumption | 48 |
| abstract_inverted_index.encryption, | 184 |
| abstract_inverted_index.homomorphic | 183 |
| abstract_inverted_index.methodology | 144 |
| abstract_inverted_index.authenticity | 126, 154 |
| abstract_inverted_index.availability | 196 |
| abstract_inverted_index.transmission | 165 |
| abstract_inverted_index.confidentiality, | 193 |
| abstract_inverted_index.energy-efficiency | 70 |
| abstract_inverted_index.Methods/Statistical | 84 |
| abstract_inverted_index.Background/Objectives: | 0 |
| abstract_inverted_index.Applications/Improvements: | 175 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/7 |
| sustainable_development_goals[0].score | 0.9200000166893005 |
| sustainable_development_goals[0].display_name | Affordable and clean energy |
| citation_normalized_percentile.value | 0.63099486 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |