Skip to main content

Advertisement

Log in

SDAFPS: Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Secure data aggregation intends to reduce redundant data transmission and malicious node interference in the network. Therefore, designing secure data aggregation protocol is a crucial task in WSNs. In this paper, we have proposed a Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution (SDAFPS) protocol. The SDAFPS protocol involves three main phases. In the first phase, the protocol controls the topology with the selection of efficient aggregator node in every interval. The second phase uses category pattern code generation and utilization concept to reduce data size and to aggregate data. Finally, in third phase, the aggregated data are encrypted using partial equation of SHAP contribution and decrypted with SHAP contribution equation. The decrypted data are verified with dataset preserved at the sink node. The SDAFPS protocol is implemented using NS2 Simulator tool and performance of proposed protocol is compared with existing protocol and validated 18% improvement in network lifetime, 10% minimized End-to-End Delay and 14% improvement on Packet Delivery Ratio over protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kassim MRM, Harun AN. Applications of WSN in agricultural environment monitoring systems. In Proceedings of International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 344–349.

  2. Ramson SJ, Moni DJ, Applications of Wireless Sensor Networks—A survey. In Proceedings of International Conference On Innovations In Electrical, Electronics, Instrumentation And Media Technology (ICEEIMT), 2017, pp. 325–329.

  3. Murillo AF, Peña M, Martínez D, Applications of WSN in health and agriculture. In Proceedings of IEEE Colombian Communications Conference (COLCOM), 2012, pp. 1–6.

  4. Lazarescu MT. Design of a WSN platform for long-term environmental monitoring for Iot applications. IEEE J Emerge Select Top Circ Syst. 2013;3(1):45–54.

    Article  Google Scholar 

  5. Zhang J, Xu L, Tsai PW, Lin ZW. Minimization of delay and collision with cross cube spanning tree in wireless sensor networks. Wireless Netw. 2018;11:1–19.

    Google Scholar 

  6. X. Liu, C. Jiannong, L. Steven, Y. Chao, W. Hejun and Y. L. Xu. "Energy efficient clustering for WSN-based structural health monitoring." in Proceedings of IEEE INFOCOM, pp. 2768–2776, 2011.

  7. M. A. Patel and M. M. Patel, "Wormhole Attack Detection in Wireless Sensor Network," in Proceedings of International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 269–274, 2018, doi: https://doi.org/10.1109/ICIRCA.2018.8597366.

  8. H. W. Ferng, M. Hadiputro, and A. Kurniawan, “Design of Novel Node Distribution Strategies in Corona-Based Wireless Sensor Networks,” on IEEE480 Transactions on Mobile Computing, 10(9):1297–1311, 2019.

  9. M. Doudou, D. Djenouri, and N. Badache, “Survey on Latency Issues of Asynchronous MAC Protocols in Delay-Sensitive Wireless Sensor Networks. IEEE Communication Surveys Tuts., 15(2):528–550, 2013.

  10. Cao L, Cai Y, Yue Y, Cai S, Hang B. A novel data fusion strategy based on extreme learning machine optimized by bat algorithm for mobile heterogeneous wireless sensor networks. IEEE Access. 2020;8:16057–72. https://doi.org/10.1109/ACCESS.2020.2967118.

    Article  Google Scholar 

  11. Chu XY, Sethu H. Cooperative topology control with adaptation for improved lifetime in wireless sensor networks. Ad Hoc Netw. 2015;30:99–114.

    Article  Google Scholar 

  12. Jia DY, Zhu HH, Zou SX, et al. Dynamic cluster head selection method for wireless sensor network. IEEE Sens J. 2016;16(8):2746–54.

    Article  Google Scholar 

  13. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: security protocols for sensor network. Wireless Netw. 2002;8(5):521–34.

    Article  Google Scholar 

  14. Huang Y, Tang B, Deng L, Zhao C, Fuzzy analytic hierarchy process-based balanced topology control of wireless sensor networks for machine vibration monitoring. IEEE Sens J 20(15):8256–8264, 2020. https://doi.org/10.1109/JSEN.2020.2966049.

  15. Cam H, Ozdemir S, Nair P, Muthuavinashiappan D, ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks. IEEE Sensors 2:732–736. https://doi.org/10.1109/ICSENS.2003.1279038

  16. Reshma S, Shalia K, Venugopal KR, “MIPSOE – Markov Integrated PSO Encryption Algorithm for Secure Data Aggregation. In Proceedings of 2nd International Conference on IoT, Social, Mobile, Analytics and Cloud in Computational Vision and Bio-Engineering (ISMAC - CVB 2020), pp. 542–548, 2020.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Reshma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, RK Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reshma, S., Shaila, K. & Venugopal, K.R. SDAFPS: Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution. SN COMPUT. SCI. 2, 86 (2021). https://doi.org/10.1007/s42979-021-00475-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00475-1

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy