Abstract
The various application in Wireless Sensor Networks fascinated towards minimal and secure data transmission. In this paper, VEDSDA protocol is proposed to achieve reduction of data redundancy, data length and providing security for data transmission. The VEDSDA protocol used compression technique to reduce data length which helps to utilize less energy consumption. The data compression technique involves leveling, encoding and decoding phases. Levelling phase converts data to logical data where as encoding phase compress the data size at the source node and decoding phase decompress the data size at the destination. The voronoi diagram concept is used to encrypt and decrypt aggregated data. Thus, VEDSDA protocol is compared with existing protocol and proves better enhancement.
Similar content being viewed by others
References
Karthik, S., & Ashok Kumar, Dr. A. (2015). Challenges of wireless sensor networks and issues associated with time synchronization. In Proceedings of advanced networking and applications (pp. 2402–2406).
Alotaibi, M. (2014). Security to wireless sensor networks against malicious attacks using hamming residue method. EURASIP Journal on Wireless Communications and Networking, 25(3), 750–761.
Gupta, M., Gao, J., Yan, X., Cam, H., & Han, J. (2014). Top-K interesting subgraph discovery in information networks. In TInternational council for open and distance education (ICDE) conference (pp. 820–831).
Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel Distribution System, 25(3), 750–761.
Krishnan, A. M., & Kumar, P. G. (2015). An effective clustering approach with data aggregation using multiple mobile sinks for heterogeneous WSN. IEEE Transactions on Parallel Distribution system, 20(2), 423–424.
Nguyen, M. T., Teague, K. A., & Rahnavard, N. (2016). CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing blockwise compressive sensing. Computer Networks, 106, 171–185.
Abirami, T., & Anandamurugan, S. (2015). Data aggregation in wireless sensor network using shuffled frog algorithm. Wireless Personal Communications, 90(2), 1–13.
Bojan, S., & Nikola, Z. (2013). Genetic algorithm as energy optimization method in WSN, on Telecommunications Forum (TELFOR) (pp. 97–100).
Kandukuri, S., Lebreton, J., Murad, N., Lorion, R., & Genon-Catalot, D. (2016). Data window aggregation techniques for energy saving in wireless sensor networks. In IEE symposium on computers and communication (ISCC) (pp. 226–231).
He, D., Kumar, N., & Lee, J. H. (2016). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, 22(2), 491–501.
Hiker, A., Cerqueira, E., Curado, M., & Monteiro, E. (2016). A two-tier adaptive data aggregation approach for M2M group communication. IEEE Sensors Journal, 16(3), 823–835.
Jiang, M., Fu, A., & Wong, R. (2015). Exact Top-k nearest keyword search in large networks, In Proceedings of the 2015 ACM SIGMOD international conference on management of data—SIGMOD ’15 (pp. 393–404).
Castelluccia, C., Chan, A., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–36.
Costa, D. G., Figueredo, S., & Oliveira, G. (2017). Cryptography in wireless multimedia sensor networks: A survey and research directions. International Journal of Cryptography, 1(4), 1–18.
Castellucia, C., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure data aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks, 5(3), 1–35.
Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks, In The second annual international conference on mobile and ubiquitous systems: Networking and services (pp. 109–117).
Acharya, M., Girao, J., & Westhoff, D. (2005). Secure comparison of encrypted data in wireless sensor networks. Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’05), 1(22), 47–53.
Xu, C., Lu, R., Wang, H., Zhu, L., & Huang, C. (2017). PAVS: A new privacy-preserving data aggregation scheme for vehicle sensing systems. Sensors, 17(3), 1–18.
Fu, Z., Sun, X., & Ji, S. (2016). A lightweight multi-layer authentication protocol for wireless body area networks. In IEEE INFOCOM 2016—The 35th annual ieee international conference on computer communications (pp. 20–29).
Damodar Reddy, E., & Prasantha, K Jana. (2012). Clustering biological data using voronoi diagram. In Proceedings of ADOCNS 2011 (pp. 188–197).
Kalyani, S. N., & Kumar, S. S. (2015). Energy efficient data aggregation using voronoi diagram. In Proceedings of internal conference on signal processing and communication (pp. 10–13).
Vamsi, P. R., & Kant, K. (2015). Secure data aggregation and intrusion detection in wireless sensor networks. In Proceedings of internal conference on signal processing and communication (pp. 10–13).
Annapurna, H. S., & Siddappa, M. (2015). Secure data aggregation with fault tolerance for wireless sensor networks. In International conference on emerging research in electronics, computer science and technology (pp. 252–258).
Razaque, A., & Rizvib, S. S. (2017). Secure data aggregation using access control and authentication for wireless sensor networks. Computers and Society, 70, 532–545.
Mahimkar, A., & Rappapart, T. S. (2004). ‘ecureDAV: A secure data aggregation and verification protocol for sensor networks. In Proceedings of IEEE global telecommunications conference (pp. 2175–2179).
Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 681–694.
Cam, H., Ozdemir, S., Nair, P., & Muthuavinashiappan, D. (2003). ESPDA: Energy-efficient and secure pattern-based data aggregation for wireless sensor networks. In Proceedings of IEEE sensors (pp. 732–736).
Sonli, H. O., Ozdemir, S., & Cam, H. (2004). SRDA: Secure reference-based data aggregation protocol for wireless sensor networks. In Proceedings of IEEE\(60_th\)vehicular technology conference (pp. 4650–4654).
Ozdemir, S., & Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735–1746.
Ozdemir, S., & Cam, H. (2010). Integrity of false data detection with data aggregation and confidentiality transmission in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(3), 736–749.
Shim, K. A., & Park, C. M. (2015). A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2128–2139.
Zhang, P., Wang, J., Guo, K., Wu, F., & Min, G. (2018). Multi-functional secure data aggregation schemes for WSNs. Ad Hoc Networks, 69, 86–99.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Reshma, S., Shaila, K. & Venugopal, K.R. VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs. Wireless Pers Commun 119, 2675–2694 (2021). https://doi.org/10.1007/s11277-021-08351-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08351-0