4.7 Article

IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme

Journal

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
Volume 37, Issue 8, Pages 5290-5324

Publisher

WILEY
DOI: 10.1002/int.22793

Keywords

anonymous communication; data aggregation; identity privacy; key negotiation; WSN

Funding

  1. EU Horizon 2020 Dominoes Project [771066]
  2. Natural Science Foundation of Shandong Province [ZR2019MF062]

Ask authors/readers for more resources

Intelligent systems are technologically advanced machines that can sense and respond to the surrounding environment, widely used in various fields. This research proposes a secure and anonymous data aggregation scheme, utilizing key negotiation, secure information transmission, and aggregation routing techniques to protect the identity privacy of important nodes and defend against various attacks effectively.
Intelligent systems are technologically advanced machines that can sense and respond to the surrounding environment. They have been widely used in medicine, military, transportation, automation, and other fields. However, when these systems deal with their environments, problems such as leakage of identities may occur. The adversary can damage the system communication and attack important nodes. To handle resource-constrained wireless sensor network environments, we propose a secure and anonymous data aggregation scheme. First, based on the bilinear mapping operation and onion routing concepts, we propose a key negotiation and secure information transmission scheme, which conducts confidential transmission and anonymous forwarding of messages in data aggregation. Second, an aggregation routing scheme based on link direction and residual energy is proposed to pledge messages that can arrive the base station without passing through many nodes, which saves network resources to a certain extent. Third, on the basis of the first two contributions, we propose an identity-privacy-aware secure and anonymous data aggregation scheme that protects the identity's privacy. This scheme can conceal the real identity of important nodes and protect the anonymity of messages and link relationships. In addition, an anonymous identity update and synchronization scheme is also proposed to ensure the reliability and security of communication. Meanwhile, our performance evaluations and simulations show that the proposed framework is more effective than several standard schemes with respect to the ability against various attacks, security, and overhead.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available