Effective Data Aggregation in WSN for Enhanced Security and Data Privacy

International Journal of Electrical and Electronics Engineering
© 2022 by SSRG - IJEEE Journal
Volume 9 Issue 11
Year of Publication : 2022
Authors : B. Murugeshwari, S. Aminta Sabatini, Lovelit Jose, S. Padmapriya
How to Cite?

B. Murugeshwari, S. Aminta Sabatini, Lovelit Jose, S. Padmapriya, "Effective Data Aggregation in WSN for Enhanced Security and Data Privacy," SSRG International Journal of Electrical and Electronics Engineering, vol. 9,  no. 11, pp. 1-10, 2022. Crossref, https://doi.org/10.14445/23488379/IJEEE-V9I11P101


The two biggest problems with wireless sensor networks are security and energy usage. In sensing devices, malicious nodes could be found in large numbers. The researchers have proposed several methods to find these rogue nodes. To prevent assaults on these networks and data transmission, the data must be secured. Data aggregation aids in reducing the number of messages transmitted within the network, which in turn lowers total network energy consumption. Additionally, when decrypting the aggregated data, the base station can distinguish between encrypted and consolidated analysis based on top of the cryptographic keys. By examining the effectiveness of the data aggregation in this research. To solve the above problem, the system provides a method in which an efficient cluster agent is preferred pedestal on its location at the access point and energy availability. The sensor network's energy consumption is reduced by selecting an effective cluster agent, extending the network's lifespan. The cluster's agent is in indict of compiling data for each member node. The clustering agent validates the data and tosses any errors before aggregation. The clustering agent only aggregates confirmed data. To provide end-to-end anonymity, ElGamal elliptic curve (ECE) encryption is used to secure the client data and reassign the encrypted information en route for the cluster agent. Only the base station (BS) can decrypt the data. Furthermore, an ID-based signature system is utilized to enable authenticity. This research presents a technique for recuperating lost data. The access point employs a cache-based backup system to search for lost data. In the end, the results are contrasted based on many factors, such as encryption and decryption time, aggregation time, and the sum of processing time by adjusting the sensor nodes and altering the cluster agents. The suggested cluster analysis, routing, and security protocol, predicated on the ECE algorithm, significantly outperforms the current practice.


Wireless Sensor Networks (WSN), Clustering, Routing, Cluster Agent (CA), Security, Data Aggregation.


[1] Khalid A. Darabkh, Mohammad Z. El-Yabroudi, and Ali H. El-Mousa, "BPA-CRP: A Balanced Power-Aware Clustering and Routing Protocol for Wireless Sensor Networks," Ad Hoc Networks, vol. 82, pp. 155-171, 2019. Crossref, https://doi.org/10.1016/j.adhoc.2018.08.012
[2] B. Murugeshwari, D. Selvaraj, K. Sudharson, and S. Radhika, "Data Mining with Privacy Protection using Precise Elliptical Curve Cryptography," Intelligent Automation & Soft Computing, vol. 35, no.1, pp. 839–851, 2023. Crossref, https://doi.org/10.32604/iasc.2023.028548
[3] Taochun Wang, Xiaolin Qin, Youwei Ding, Liang Liu, and Yonglong Luo, "Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks," Wireless Personal Communications, vol. 98, no. 1 pp. 665-684, 2018. Crossref, https://doi.org/10.1007/s11277-017-4889-5
[4] B. Murugeshwari, K. Sarukesi and C. Jayakumar, “An Efficient Method for Knowledge Hiding Through Database Extension,” Test Conference International, pp. 342-344, 2010. Crossref, https://doi.org/10.1109/ITC.2010.93
[5] A, Jenice and D, Hevin, “An Energy Efficient Secure Data Aggregation in Wireless Sensor Networks,” Research Square, 2021. Crossref, https://doi.org/10.21203/rs.3.rs-364741/v1
[6] Shraddha Deshmukh, A. R. Bhagat Patil and Harshad Nakade, “Implementation of Effective Key Management Strategy with Secure Data Aggregation in Dynamic Wireless Sensor Network,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 4, no. 2, pp. 358-364, 2018.
[7] Dou H, Chen Y and Yang Y, “A Secure and Efficient Privacy-Preserving Data Aggregation Algorithm,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, pp. 1495–1503, 2022. Crossref, https://doi.org/10.1007/s12652-020-02801-6
[8] Xiaohan Qi, Xiaowu Liu, Jiguo Yu and Qiang Zhang, “A Privacy Data Aggregation Scheme for Wireless Sensor Networks,” Procedia Computer Science, vol. 174, pp. 578-583, 2020. Crossref, https://doi.org/10.1016/j.procs.2020.06.127
[9] Qiyue Wu, Peng Sun, and Azzedine Boukerche, "An Energy-Efficient UAV-Based Data Aggregation Protocol in Wireless Sensor Networks," In Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 34-40, 2018. Crossref, https://doi.org/10.1145/3272036.3272047
[10] Shiva Prakash and Ashish Rajput, "Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks," In Ambient Communications and Computer Systems, Springer, pp. 589-599, 2018. Crossref, https://doi.org/10.1007/978-981-10-7386-1_50
[11] Anish Soni and Dr.Rajneesh Randhawa, "OSDAP-Optimized and Secure Data Aggregation Protocol for Wireless Sensor Networks," International Journal of Applied Engineering Research, vol. 13, no. 5, pp. 3027-3033, 2018.
[12] K. Nirmal Raja and M. Maraline Beno, "Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto (FO) Authentication Scheme Against Sybil Attack," Journal of Medical Systems, vol. 41, no. 7, pp. 107, 2017. Crossref, https://doi.org/10.1007/s10916- 017-0743-2
[13] D. Anita Daniel, S. Emalda Roslin, “An Efficient Data Aggregation Technique for Green Communication in WSN,” International Journal of Engineering Trends and Technology, vol. 69, no. 3, pp. 138-146, 2021. Crossref, https://doi.org/10.14445/22315381/IJETTV69I3P222
[14] G. Mehmood, M. Z. Khan, A. Waheed, M. Zareei and E. M. Mohamed, "A Trust-Based Energy-Efficient and Reliable Communication Scheme (Trust-Based ERCS) for Remote Patient Monitoring in Wireless Body Area Networks," in IEEE Access, vol. 8, pp. 131397- 131413, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3007405
[15] Dhinakaran D and Joe Prathap P. M, "Protection of Data Privacy from Vulnerability Using Two-Fish Technique with Apriori Algorithm in Data Mining," The Journal of Supercomputing, vol. 78, pp. 17559–17593, 2022. Crossref, https://doi.org/10.1007/s11227-022-04517-0
[16] K. Sudharson, M. Akshaya, M. Lokeswari and K. Gopika, "Secure Authentication Scheme Using CEEK Technique for Trusted Environment," 2022 International Mobile and Embedded Technology Conference (MECON), pp. 66-71, 2022. Crossref, https://doi.org/10.1109/MECON53876.2022.9752245
[17] D. Anita Daniel and S. Emalda Roslin, "An Efficient Data Aggregation Technique for Green Communication in WSN," International Journal of Engineering Trends and Technology, vol. 69, no. 3, pp. 138-146, 2021. Crossref, https://doi.org/10.14445/22315381/IJETT-V69I3P222
[18] Jeyalakshmi. C, Balasubramaniam, Murugeshwari and Karthick, M, “HMM and K-NN based Automatic Musical Instrument Recognition,” IEEE, pp. 350-355, 2018. Crossref, https://doi.org/10.1109/I-SMAC.2018.8653725
[19] Khalid A. Darabkh, Saja M. Odetallah, Zouhair Al-qudah, Khalifeh Ala’F, and Mohammad M. Shurman, "Energy-Aware and Density-Based Clustering and Relaying Protocol (EA-DB-CRP) for Gathering Data in Wireless Sensor Networks," Applied Soft Computing, vol. 80, pp. 154-166, 2019. Crossref, https://doi.org/10.1016/j.asoc.2019.03.025
[20] Mohamed Elshrkawey, Samiha M. Elsherif, and M. Elsayed Wahed, "An Enhancement Approach for Reducing The Energy Consumption In Wireless Sensor Networks," Journal of King Saud University-Computer and Information Sciences, vol. 30, no. 2, pp. 259-267, 2018. Crossref, https://doi.org/10.1016/j.jksuci.2017.04.002
[21] K. Sudharson and S. Arun, "Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm," Intelligent Automation & Soft Computing, vol. 34, no. 3, pp. 1769–1784, 2022. Crossref, https://doi.org/10.32604/iasc.2022.026483
[22] Balasubramaniam Murugeshwari, Daniel Raphael and Raghavan Singaravelu, “Metamaterial Inspired Structure with Offset-Fed Microstrip Line for Multi-Band Operations,” Progress in Electromagnetics Research, vol. 82, pp. 95-105, 2019.
[23] Vinod Kumar and Om Prakash Roy, "A Reliable and Secure Inter-and Intra-State Routing Protocol for VoIP communication," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 479-490, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P250
[24] Tianshu Wang, Gongxuan Zhang, Xichen Yang, and Ahmadreza Vajdi, "Genetic Algorithm for Energy- Efficient Clustering and Routing in Wireless Sensor Networks," Journal of Systems and Software, vol. 146, pp. 196-214, 2018. Crossref, https://doi.org/10.1016/j.jss.2018.09.067
[25] D. Dhinakaran, P.M. Joe Prathap, D. Selvaraj, D. Arul Kumar, and B. Murugeshwari, “Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing,” International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P232
[26] Avinash Rai, and Preetu Patel, "Secure Data Aggregation Technique for Wireless Sensor Networks using Iterative Filtering Algorithm," International Journal of Applied Engineering Research, vol. 13, no. 18, pp. 13805-13811, 2018.
[27] D. Dhinakaran, D. A. Kumar, S. Dinesh, D. Selvaraj and K. Srikanth, “Recommendation System for Research Studies Based on GCR,” 2022 International Mobile and Embedded Technology Conference (MECON), Noida, India, pp. 61-65, 2022. Crossref, https://doi.org/10.1109/MECON53876.2022.9751920
[28] J. Aruna Jasmine, V. Nisha Jenipher, J. S. Richard Jimreeves, K. Ravindran, and D. Dhinakaran, “A Traceability Set Up Using Digitalization of Data and Accessibility,” 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 907-910, 2020. Crossref, https://doi.org/10.1109/ICISS49785.2020.9315938
[29] M.Supriya, Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I12P103
[30] K.Sudharson, Ahmed Mudassar Ali and N.Partheeban, "NUITECH – Natural user Interface Technique Foremulating Computer Hardware," International Journal of Pharmacy & Technology, vol. 8, no. 4, pp. 23598-23606, 2016.
[31] S. Arun and K. Sudharson. "DEFECT: discover and eradicate fool around node in Emergency Network using Combinatorial Techniques," Journal of Ambient Intelligence and Humanized Computing, pp. 1-12, 2020. Crossref, https://doi.org/10.1007/s12652- 020-02606-7
[32] J. A. Shanny and K. Sudharson, "User Preferred Data Enquiry System using Mobile Communications," International Conference on Information Communication and Embedded Systems (ICICES2014), pp. 1-5, 2014. Crossref, https://doi.org/10.1109/ICICES.2014.7033943
[33] D. Dhinakaran and P.M. Joe Prathap, “Ensuring Privacy of Data and Mined Results of Data Possessor in Collaborative ARM, Pervasive Computing and Social Networking,” Lecture Notes in Networks and Systems, Springer, Singapore, vol. 317, pp. 431-444, 2022. Crossref, https://doi.org/10.1007/978-981-16-5640-8_34
[34] D. Dhinakaran and P. M. Joe Prathap, “Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm,” Intelligent Automation & Soft Computing, vol. 33, no. 3, pp. 1877-1892, 2022. Crossref, https://doi.org/10.32604/iasc.2022.024509
[35] K. Sudharson, A. M. Sermakani, V. Parthipan, D. Dhinakaran, G. Eswari Petchiammal and N. S. Usha, "Hybrid Deep Learning Neural System for Brain Tumor Detection," 2022 2nd International Conference on Intelligent Technologies (CONIT), pp. 1-6, 2022. Crossref, https://doi.org/10.1109/CONIT55038.2022.9847708
[36] K.Priyadharshini, "A Review on Wireless Sensor Networks-Security Issues and Disputes," International Journal of P2P Network Trends and Technology, vol. 9, no. 2, pp. 6-9, 2019.
[37] Korada Kishore Kumar and Konni Srinivasa Rao, "An Efficient users Authentication and Secure Data Transmission of Cluster-based Wireless Sensor Network," SSRG International Journal of Computer Science and Engineering, vol. 5, no. 1, pp. 1-5, 2018. Crossref, https://doi.org/10.14445/23488387/IJCSE-V5I1P101
[38] Khalid A. Darabkh, Noor J. Al-Maaitah, Iyad F. Jafar and Ala’F Khalifeh, "EA-CRP: A Novel Energy-Aware Clustering and Routing Protocol in Wireless Sensor Networks," Computers & Electrical Engineering, vol. 72, pp. 702-718, 2018. Crossref, https://doi.org/Crossref, https://doi.org/10.1016/j.compeleceng.2017.11.017
[39] Murugeshwari, “Preservation of the Privacy for Multiple Custodian Systems with Rule Sharing,” Journal of Computer Science, vol. 9, no. 9, pp. 1086-1091, 2013. Crossref, https://doi.org/10.3844/jcssp.2013.1086.1091
[40] B. Murugeshwari, R.S. Daniel and S. Raghavan, “A Compact Dual Band Antenna Based on Metamaterial-Inspired Split Ring Structure and Hexagonal Complementary Split-Ring Resonator for ISM/Wimax/WLAN Applications,” Applied Physics A, vol. 125, pp. 628, 2019. Crossref, https://doi.org/10.1007/s00339-019-2925-x
[41] N.Partheeban, K.Sudharson and P.J.Sathish Kumar, "SPEC- Serial Property Based Encryption for Cloud," International Journal of Pharmacy & Technology, vol. 8, no. 4, pp. 23702-23710, 2016.
[42] K. Sudharson and V. Parthipan, "A Survey on ATTACK – Anti-Terrorism Technique for Adhoc Using Clustering and Knowledge Extraction," Advances in Computer Science and Information Technology, Computer Science and Engineering, CCSIT 2012, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, Berlin, Heidelberg, vol. 85, pp. 508-514, 2012. Crossref, https://doi.org/10.1007/978-3-642-27308-7_54
[43] K. Sudharson and V. Parthipan, "SOPE: Self-Organized Protocol for Evaluating Trust in MANET Using Eigen Trust Algorithm," 2011 3rd International Conference on Electronics Computer Technology, pp. 155-159, 2011. Crossref, https://doi.org/10.1109/ICECTECH.2011.5941675