A Privacy Preservation Strategy Using Hybrid Fully Homomorphic Encryption Scheme in IoT

被引:0
|
作者
Chaudhari, Anita [1 ]
Bansode, Rajesh [2 ]
机构
[1] Mumbai Univ, St John Coll Engn & Management, Dept Informat Technol, Mumbai, Maharashtra, India
[2] Mumbai Univ, Thakur Coll Engn & Technol, Dept Informat Technol, Mumbai, Maharashtra, India
关键词
Wireless sensor networks; Internet of Things; false data injection attack; packet authentication code and privacy preservation; WIRELESS SENSOR NETWORKS; DATA AGGREGATION SCHEME; DATA INJECTION ATTACKS; DATA INTEGRITY; INTERNET; THINGS; AUTHENTICATION;
D O I
10.1142/S0218843023500077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Wireless Sensor Network affords the basis for the Internet of Things (IoT) systems that typically produce large and imprecise information. This information has to be integrated faster and efficiently handled. Various devices deployed with IoT exists like organizational automation, smart grid etc. To sub-ordinate this system software as well as their applications, the Packet Authentication Code (PAC) and routing protocols are essentially required for interoperability and scalability. Hence, this study intends to propose a system based on PAC to preserve privacy, thereby handling the False Data Injection (FDI) attacks.The study performs the authentication process where the nodes are authenticated even before the data transmission for efficient security. A privacy preservation model is also employed to deal with the FDI attacks. Data aggregation is also performed to reduce the end-to-end delay and communication overhead.A hybrid Gentry, Sahai and Waters (GSW) and Ducas and Micciancio (DM) are proposed to handle the FDI attacks through a key generation process. In addition, a PAC is generated to improvise the security that includes various processes such as group formation of the node members, key generation, as well as distribution and unique sensor number generation to authenticate using PAC.The performance of the proposed system is analyzed through a comparative analysis in terms of specific significant parameters to evaluate the efficacy of the proposed method. The analytical results reveal the efficiency of the proposed hybrid GSW-DM with PAC for privacy preservation than the existing systems.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [32] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [33] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [34] Homomorphic Encryption Based Privacy-Preservation for IoMT
    Salim, Mikail Mohammed
    Kim, Inyeung
    Doniyor, Umarov
    Lee, Changhoon
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2021, 11 (18):
  • [35] A Privacy Preserving Truthful Spectrum Auction Scheme using Homomorphic Encryption
    Wang, Xiaoyan
    Ji, Yusheng
    Zhou, Hao
    Liu, Zhi
    Gu, Yu
    Li, Jie
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [36] PPSSDHE: privacy preservation in smartphone sensors data using ElGamal homomorphic encryption
    Manimaran, S.
    Priya, D. Uma
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2024, 46 (04) : 218 - 229
  • [37] Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
    Goswami, Utsav
    Wang, Kevin
    Nguyen, Gabriel
    Lagesse, Brent
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [38] Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
    Ruixiao Li
    Ishimaki, Yu
    Yamana, Hayato
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 315 - 322
  • [39] Privacy-preserving biometrics authentication systems using fully homomorphic encryption
    Torres, Wilson Abel Alberto
    Bhattacharjee, Nandita
    Srinivasan, Bala
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (02) : 151 - 168
  • [40] Big Data Privacy using Fully Homomorphic Non-deterministic Encryption
    Patil, Tejashree B.
    Patnaik, Girish Kumar
    Bhole, Ashish T.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 138 - 143