A Privacy Preservation Strategy Using Hybrid Fully Homomorphic Encryption Scheme in IoT

被引:0
|
作者
Chaudhari, Anita [1 ]
Bansode, Rajesh [2 ]
机构
[1] Mumbai Univ, St John Coll Engn & Management, Dept Informat Technol, Mumbai, Maharashtra, India
[2] Mumbai Univ, Thakur Coll Engn & Technol, Dept Informat Technol, Mumbai, Maharashtra, India
关键词
Wireless sensor networks; Internet of Things; false data injection attack; packet authentication code and privacy preservation; WIRELESS SENSOR NETWORKS; DATA AGGREGATION SCHEME; DATA INJECTION ATTACKS; DATA INTEGRITY; INTERNET; THINGS; AUTHENTICATION;
D O I
10.1142/S0218843023500077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Wireless Sensor Network affords the basis for the Internet of Things (IoT) systems that typically produce large and imprecise information. This information has to be integrated faster and efficiently handled. Various devices deployed with IoT exists like organizational automation, smart grid etc. To sub-ordinate this system software as well as their applications, the Packet Authentication Code (PAC) and routing protocols are essentially required for interoperability and scalability. Hence, this study intends to propose a system based on PAC to preserve privacy, thereby handling the False Data Injection (FDI) attacks.The study performs the authentication process where the nodes are authenticated even before the data transmission for efficient security. A privacy preservation model is also employed to deal with the FDI attacks. Data aggregation is also performed to reduce the end-to-end delay and communication overhead.A hybrid Gentry, Sahai and Waters (GSW) and Ducas and Micciancio (DM) are proposed to handle the FDI attacks through a key generation process. In addition, a PAC is generated to improvise the security that includes various processes such as group formation of the node members, key generation, as well as distribution and unique sensor number generation to authenticate using PAC.The performance of the proposed system is analyzed through a comparative analysis in terms of specific significant parameters to evaluate the efficacy of the proposed method. The analytical results reveal the efficiency of the proposed hybrid GSW-DM with PAC for privacy preservation than the existing systems.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption
    Kim, Sangwook
    Omori, Masahiro
    Hayashi, Takuya
    Omori, Toshiaki
    Wang, Lihua
    Ozawa, Seiichi
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 : 349 - 358
  • [42] Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme
    Bai, Shuangjie
    Yang, Geng
    Shi, Jingqi
    Liu, Guoxiu
    Min, Zhaoe
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [43] Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption
    Im, Jong-Hyuk
    Youn, Taek-Young
    Lee, Mun-Kyu
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2598 - 2600
  • [44] Secure State Estimation Using Hybrid Homomorphic Encryption Scheme
    Zhang, Zhenyong
    Cheng, Peng
    Wu, Junfeng
    Chen, Jiming
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2021, 29 (04) : 1704 - 1720
  • [45] Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption
    Liu, Chengjin
    Zoe L Jiang
    Zhao, Xin
    Chen, Qian
    Fang, Junbin
    He, Daojing
    Zhang, Jun
    Wang, Xuan
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [46] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [47] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [48] A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data
    G. Prabu Kanna
    V. Vasudevan
    Cluster Computing, 2019, 22 : 9561 - 9569
  • [49] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [50] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211