Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
5,303 result(s) for "Data aggregation"
Sort by:
Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks
By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.
Research on gesture recognition of smart data fusion features in the IoT
With the rapid development of Internet of things technology, the interaction between people and things has become increasingly frequent. Using simple gestures instead of complex operations to interact with the machine, the fusion of smart data feature information and so on has gradually become a research hotspot. Considering that the depth image of the Kinect sensor lacks color information and is susceptible to depth thresholds, this paper proposes a gesture segmentation method based on the fusion of color information and depth information; in order to ensure the complete information of the segmentation image, a gesture feature extraction method based on Hu invariant moment and HOG feature fusion is proposed; and by determining the optimal weight parameters, the global and local features are effectively fused. Finally, the SVM classifier is used to classify and identify gestures. The experimental results show that the proposed fusion features method has a higher gesture recognition rate and better robustness than the traditional method.
Distributed meter data aggregation framework based on Blockchain and homomorphic encryption
A significant progress in modern power grids is witnessed by the tendency of becoming complex cyber‐physical systems. As a fundamental physical infrastructure, smart meter in the demand side provides real‐time energy consumption information to the utility. However, ensuring information security and privacy in the meter data aggregation process is a non‐trivial task. This study proposes a distributed, privacy‐preserving, and secure meter data aggregation framework, backed up by Blockchain and homomorphic encryption (HE) technologies. Meter data are aggregated and verified by a hierarchical Blockchain system, in which the consensus mechanism is supported by the practical Byzantine fault tolerance algorithm. On the top of the Blockchain system, HE technology is used to protect the privacy of individual meter data items during the aggregation process. Performance analysis is conducted to validate the proposed method.
Proximate node aware optimal and secure data aggregation in wireless sensor network based IoT environment
Internet of things (IoT) has become one of the eminent phenomena in human life along with its collaboration with wireless sensor networks (WSNs), due to enormous growth in the domain; there has been a demand to address the various issues regarding it such as energy consumption, redundancy, and overhead. Data aggregation (DA) is considered as the basic mechanism to minimize the energy efficiency and communication overhead; however, security plays an important role where node security is essential due to the volatile nature of WSN. Thus, we design and develop proximate node aware secure data aggregation (PNA-SDA). In the PNA-SDA mechanism, additional data is used to secure the original data, and further information is shared with the proximate node; moreover, further security is achieved by updating the state each time. Moreover, the node that does not have updated information is considered as the compromised node and discarded. PNA-SDA is evaluated considering the different parameters like average energy consumption, and average deceased node; also, comparative analysis is carried out with the existing model in terms of throughput and correct packet identification.
An Energy Efficient and Scalable WSN with Enhanced Data Aggregation Accuracy
This paper introduces a method that combines the K-means clustering genetic algorithm (GA) and Lempel-Ziv-Welch (LZW) compression techniques to enhance the efficiency of data aggregation in wireless sensor networks (WSNs). The main goal of this research is to reduce energy consumption, improve network scalability, and enhance data aggregation accuracy. Additionally, the GA technique is employed to optimize the cluster formation process by selecting the cluster heads, while LZW compresses aggregated data to reduce transmission overhead. To further optimize network traffic, scheduling mechanisms are introduced that contribute to packets being transmitted from sensors to cluster heads. The findings of this study will contribute to advancing packet scheduling mechanisms for data aggregation in WSNs in order to reduce the number of packets from sensors to cluster heads. Simulation results confirm the system's effectiveness compared to other compression methods and non-compression scenarios relied upon in LEACH, M-LEACH, multi-hop LEACH, and sLEACH approaches.
Data Aggregation Privacy in WSN
When WSN is applied to monitoring, the privacy of monitoring data from monitoring objects becomes an important issue for the successful application of WSN, which requires effective privacy protection for data aggregation. CPDA (Cluster-based Private Data Aggregation) has a problem that energy costs become higher with increase of nodes within a cluster. In this paper, UCPDA (Upgrade Cluster-based Private Data Aggregation) is established to perform data aggregation while preserving data privacy. According to required privacy, the sensors in a cluster are partitioned into some groups. Data preprocessing is performed only in the same group. Compared to CPDA, UCPDA has lower energy consumption for required privacy.
An adaptive artificial-fish-swarm-inspired fuzzy C-means algorithm
Fuzzy C-means (FCM) is a classical algorithm of cluster analysis which has been applied to many fields including artificial intelligence, pattern recognition, data aggregation and their applications in software engineering, image processing, IoT, etc. However, it is sensitive to the initial value selection and prone to get local extremum. The classification effect is also unsatisfactory which limits its applications severely. Therefore, this paper introduces the artificial-fish-swarm algorithm (AFSA) which has strong global search ability and adds an adaptive mechanism to make it adaptively adjust the scope of visual value, improves its local and global optimization ability, and reduces the number of algorithm iterations. Then it is applied to the improved FCM which is based on the Mahalanobis distance, named as adaptive AFSA-inspired FCM(AAFSA-FCM). The optimal solution obtained by adaptive AFSA (AAFSA) is used for FCM cluster analysis to solve the problems mentioned above and improve clustering performance. Experiments show that the proposed algorithm has better clustering effect and classification performance with lower computing cost which can be better to apply to every relevant area, such as IoT, network analysis, and abnormal detection.
Secure and Cost-Effective Distributed Aggregation for Mobile Sensor Networks
Secure data aggregation (SDA) schemes are widely used in distributed applications, such as mobile sensor networks, to reduce communication cost, prolong the network life cycle and provide security. However, most SDA are only suited for a single type of statistics (i.e., summation-based or comparison-based statistics) and are not applicable to obtaining multiple statistic results. Most SDA are also inefficient for dynamic networks. This paper presents multi-functional secure data aggregation (MFSDA), in which the mapping step and coding step are introduced to provide value-preserving and order-preserving and, later, to enable arbitrary statistics support in the same query. MFSDA is suited for dynamic networks because these active nodes can be counted directly from aggregation data. The proposed scheme is tolerant to many types of attacks. The network load of the proposed scheme is balanced, and no significant bottleneck exists. The MFSDA includes two versions: MFSDA-I and MFSDA-II. The first one can obtain accurate results, while the second one is a more generalized version that can significantly reduce network traffic at the expense of less accuracy loss.
Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
The objective of concealed data aggregation is to achieve the privacy preservation at intermediate nodes while supporting in-network data aggregation. The need for privacy preservation at intermediate nodes and the need for data aggregation at intermediate nodes can be simultaneously realized using privacy homomorphism. Privacy homomorphism processes the encrypted data without decrypting them at intermediate nodes. However, privacy homomorphism is inherently malleable. Although malicious adversaries cannot view transmitted sensor readings, they can manipulate them. Hence, it is a formidable challenge to realize conflicting requirements, such as end-to-end privacy and end-to-end integrity, while performing en route aggregation. In this paper, we propose a malleability resilient concealed data aggregation protocol for protecting the network against active and passive adversaries. In addition, the proposed protocol protects the network against insider and outsider adversaries. The proposed protocol simultaneously realizes the conflicting objectives like privacy at intermediate nodes, end-to-end integrity, replay protection, and en route aggregation. As per our knowledge, the proposed solution is the first that achieves end-to-end security and en route aggregation of reverse multicast traffic in the presence of insider, as well as outsider adversaries.
Survey of data aggregation techniques using soft computing in wireless sensor networks
In wireless sensor networks (WSN), data aggregation using soft computing methods is a challenging issue because of the security factors. When a node is compromised, it is easy for an adversary to inject false data and mislead the aggregator to accept false readings. Therefore there is a need for secure data aggregation. Although sufficient works on the survey of data aggregation in WSNs are done, it seems less satisfactory in terms of maintaining a secured data aggregation, and measuring accurate values. This study presents an up to date survey of major contributions to the security solutions in data aggregation which mainly use soft computing techniques. Here, classification of protocols is done according to the soft computing technique as: fuzzy logic, swarm intelligence, genetic algorithm and neural networks. Accuracy, energy consumption, cost reduction and security measures are the metrics used for the classification. Finally, the authors provide a comparative study of all aggregation techniques.