Int
ern
at
i
onal
Journ
al of
A
d
vances in
A
p
p
li
ed Sciences
(
IJ
A
AS
)
Vo
l.
7
, No
.
4
,
Decem
ber
201
8
, p
p.
369
~
376
IS
S
N:
22
52
-
8
8
14
,
DOI: 10
.11
591/ija
as
.v
7
.i
4
.
pp369
-
376
369
Journ
al h
om
e
page
:
http:
//
ia
e
score.
c
om/j
ourn
als/i
ndex.
ph
p/IJAA
S
A Secur
e Data T
ra
nsmi
ssi
on Schem
e using As
ymmetric S
em
i
-
Homom
or
ph
ic E
ncryptio
n Schem
e
S. Nag
avalli
1
, G.R
am
achan
dran
2
1
Depa
rtment of
Com
pute
r
and
In
form
at
ion
Sci
en
ce
s,
Ann
amala
i
Univer
sit
y
,
Annam
al
ai
n
aga
r
–
60
8
002,
Ta
m
il Na
du,
India
.
2
Depa
rtment of
Com
pute
r
Scie
n
ce
& Engi
ne
eri
n
g,
Annam
alai
U
nive
rsit
y
,
Anna
m
al
ai
nag
ar
–
608
002,
Ta
m
il Nad
u,
Indi
a.
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
y
2
8
, 201
8
Re
vised
Ju
l
26
,
201
8
Accepte
d
Aug 21
, 201
8
The
compress
ive
detec
ti
ng
base
d
i
nform
at
ion
ac
cu
m
ula
ti
on
accom
pli
shes
wit
h
high
exact
ness
in
informati
on
r
ec
uper
at
ion
f
ro
m
le
ss
inspec
tion
which
is
ava
i
la
bl
e
in
sensor
nodes.
In
thi
s
m
anne
r,
the
exi
st
ing
m
et
hods
av
ailable
in
th
e
li
te
r
at
ur
e
dimini
sh
the
informat
i
on
gat
her
ing
co
st
and
de
lay
s
th
e
exi
st
ence
c
y
cle
o
f
W
SN
s.
In
th
is
pap
er,
a
strong
a
chi
ev
able
se
cur
ity
m
odel
for
sensor
net
work
applications
was
ini
tial
l
y
propos
ed.
At
tha
t
po
int
,
a
s
ec
ure
d
ata
col
l
ec
t
ion
consp
ire
was
d
isplaye
d
b
ase
d
on
co
m
pre
ss
ive
de
te
c
ti
ng,
whi
ch
improves
the
inf
orm
at
ion
protect
ion
b
y
the
as
y
m
m
et
ric
sem
i
-
ho
m
om
orphic
enc
r
y
pt
ion
sche
m
e,
and
d
ec
r
e
ase
s
the
calc
u
l
at
ion
cost
b
y
ina
dequ
at
e
compress
ive
gri
d.
In
thi
s
ca
se
,
pa
rticula
r
l
y
t
he
as
y
m
m
et
r
ic
m
ec
hani
sm
dec
re
as
es
th
e
tr
ouble
of
m
y
st
er
y
ke
y
ci
r
culati
o
n
and
administr
at
ion
.
The
proposed
hom
om
orphic
en
cr
y
pt
ion
p
ermits
th
e
in
-
arr
ang
e
accu
m
ula
ti
on
in
ci
pher
dom
ai
n
,
a
nd
in
thi
s
m
anner
improves
the
se
cur
ity
and
a
cc
o
m
pli
shes
the
adj
ustm
ent
in
s
ystem
stac
k
.
Furt
her
,
th
is
p
ape
r
f
ocuse
s
on
est
imati
ng
var
ious
net
work
pe
rform
anc
es
su
ch
as
th
e
c
alculation
cos
t
and
cor
r
esponde
nce
cost
,
which
r
emunera
te
s
the
exp
an
ding
cost
c
ause
d
b
y
the
ho
m
om
orphic
enc
r
y
pt
ion.
A
re
al
ti
m
e
v
al
id
at
io
n
on
th
e
propos
ed
en
cr
y
pti
on
sc
heme
using
AV
ISPA
was a
ddit
ionall
y
per
for
m
ed
and the
r
esu
lt
s a
r
e
sa
ti
sfac
tor
y
.
Ke
yw
or
d:
Ho
m
om
or
ph
ic
Encr
y
ption
Sy
m
m
e
tric
Cryptosyst
em
W
i
reless
Senso
r
N
et
w
ork
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
S. Naga
valli
,
Dep
a
rtm
ent o
f C
om
pu
te
r
an
d Inform
at
ion
Sc
ie
nces,
Annam
al
ai
U
niv
ersit
y,
Annam
al
ai
na
gar
–
608 0
02, Ta
m
il
N
adu
,
In
dia.
Em
a
il
: nag
aval
li
52
@
gm
ai
l.com
1.
INTROD
U
CTION
W
i
reless
Se
nso
r
Net
wor
ks
(
W
SN
)
has
bee
n
de
plo
ye
d
in
dif
f
eren
t
a
pp
li
cat
ion
s
w
hich
incl
ud
e
pe
rs
on
al
,
bu
si
ness
an
d
m
il
it
ary
reg
io
ns
.
It
com
pr
ise
s
of
bunc
hes
of
m
inim
a
l
effor
t
a
nd
batte
ry
c
on
tr
olled
hubs,
w
hich
a
re
regularly
ci
rcu
l
at
ed
in
un
at
te
nded
c
onditi
ons
.
Secu
re
in
form
at
ion
acc
um
ula
ti
on
ha
s
bee
n
pro
posed
a
s
a
pi
vo
ta
l
way
to
deal
wi
th
set
tl
ing
t
he
vital
it
y
and
se
cur
it
y
chall
en
ge
s.
T
he
c
om
pr
essive
detect
in
g
base
d
in
for
m
at
ion
accum
ulati
on
[
1
-
3], w
hic
h
join
in
f
or
m
at
ion
p
r
oc
ur
em
ent
w
it
h
inf
orm
ation
press
ur
e,
c
a
n
ou
t
perform
the
lim
it
s
of
the
c
us
t
om
a
ry
hypothesis
by
inv
est
igati
ng
the
sp
a
rsity
of
com
pr
essible
s
ign
s
.
It
accom
plishes
high
acc
ur
acy
inf
or
m
at
ion
re
cup
e
rati
on
fro
m
le
ss
te
sti
ng
in
f
or
m
at
ion
,
an
d
i
n
this
way
dim
inis
hes
t
he
in
f
orm
at
ion
accum
ulati
on
c
os
t a
nd
draw
s
ou
t t
he
e
xisten
ce cy
cl
e o
f
WSNs.
In
rece
nt
ti
m
es
, m
os
t
of
t
he se
ns
or
hubs
ca
n'
t
av
oid
a
ssaults
and
are
anyt
hi
ng
but
diff
ic
ult
to
cat
ch
,
s
o
hubs
a
re
no
t
a
ppr
opriat
e
f
or
pu
t
a
way
pr
iva
te
data.
E
ven
a
tt
ackers
with
t
heir
assa
ult
m
od
el
s
are
ef
fici
ent;
the
enem
y
traded
off
a
hub
i
niti
al
ly
,
and
a
fter
ward
act
ualiz
e
d
the
assa
ult
to
get
the
est
im
at
ion
gri
d.
In
order
t
o
secur
e
t
he
se
nsor
netw
ork,
va
rio
us
m
ini
m
a
l
encr
ypti
on
sc
hem
es
hav
e
be
en
pro
pose
d.
Nu
m
erous
w
orks
on
sens
or
crypt
o s
yst
e
m
are
bein
g ca
rr
ie
d
o
ut
[
5,
6]
base
d
on
th
e
ra
ndom
iz
ed e
stim
ation
of
se
cur
it
y
co
ns
e
rv
a
ti
on.
The
Sym
m
e
tric
Cryptosyst
e
m
[4
]
was
fi
rst
cl
arified
as
a
sing
le
key
cryptosyst
em
,
where
the
ps
eu
do
-
ra
ndom
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2252
-
88
14
IJ
A
AS V
ol
.
7
,
No.
4
,
Decem
ber
2018
:
3
69
–
376
370
est
i
m
ation
f
ra
m
ewo
r
k
was
use
d
a
s
th
e k
ey
, an
d
the
est
im
ation
res
ult
is
t
he
fig
ur
e
c
onte
nt
of u
ni
qu
e
sig
ns
.
It
i
s
a
li
gh
t
-
weig
ht
encr
y
ption
pl
ot.
Th
e
enc
odin
g
ste
p
a
nd
the
r
ecoupin
g
ste
p
can
be
tra
ns
la
te
d
as
t
he
e
ncr
y
ptio
n
and
the
unscra
m
bl
ing
se
par
at
el
y,
and
al
ong
these
li
nes
no
ad
diti
onal
com
pu
ta
ti
on
al
c
os
t
is
re
qu
i
red.
Th
e
con
t
ro
ll
a
ble
oc
casi
on
act
ivati
ng
assa
ult
sit
uation
is
j
ust
ch
ang
e
d
t
he
est
i
m
at
ion
of
one
hub,
w
hich
m
e
ans
th
e
irregular
occas
ion
act
ivati
ng
a
ssault
m
od
el
ha
s
bee
n
cha
nge
d
a
nd
al
l
the
as
saults
are
ta
r
ge
te
d
to
s
pecific
nodes
.
Hen
ce
,
t
he
e
xi
sti
ng
enc
ryptio
n
syst
em
wh
i
c
h
us
es
the
ty
pi
cal
pri
vate (m
ys
te
ry)
key
ca
nn
ot b
e re
us
ed
. In
orde
r
to
ad
dr
e
ss
the
above
m
entione
d i
ss
ues,
t
his
pap
e
r
pro
po
se
s
a
novel
hom
om
or
ph
ic
en
cry
ption
schem
e.
The
key
idea
is
to
guara
ntee
the
refres
h
of
key
a
nd
pr
oof
base
d ha
sh
capaci
ti
es,
w
hi
ch a
s
s
um
es
the
nodes
are
sec
ur
e
by
them
sel
ves.
The co
ntributi
on
of this
pap
e
r
is
as foll
ows:
1.
Pr
op
os
e
d
a m
i
nim
a
li
sti
c encr
ypti
on
sta
ndar
d wh
ic
h
s
uppo
rts all
the se
nsor
n
et
work m
od
el
.
2.
Com
pr
essive
de
te
ct
ing
based
encr
y
ption sch
e
m
e w
it
h
s
upport t
o op
ti
m
al
s
ecur
i
ng
strat
eg
y.
3.
A
sec
ur
e
pr
oof
b
ase
d o
n hash
capaci
ti
es whic
h
ass
um
es the
nodes
are se
cu
re.
The
rest
of
t
his
pa
per
is
orga
nized
a
s
f
ollo
ws:
Sect
io
n
II
discusse
s
the
s
ta
te
of
th
e
art
m
et
ho
ds
on
ho
m
om
or
ph
ic
encr
y
ption
s
ch
e
m
es.
Sect
ion
III
deals
with
the
pro
po
s
e
d
enc
ryptio
n
schem
e.
Sect
i
on
I
V
discusse
s
a
bout
the
ex
per
im
e
ntati
on
of
enc
r
ypti
on
sc
hem
e
s.
Th
e
pe
nult
im
at
e
sect
ion
of
this
pap
e
r
dis
cusses
about the
p
e
rfo
rm
ance an
al
ysi
s and
finall
y t
he
p
a
per is co
nc
lud
e
d.
2.
LIT
ERATUR
E SU
RV
E
Y
I
n
t
his
sect
io
n,
va
rio
us
sta
te
of
t
he
a
rt
te
ch
ni
qu
e
s
a
vaila
ble
in
the
li
te
ratu
re
are
disc
us
se
d.
This
s
ect
ion
dissect
s int
o
th
ree
ph
ase
s
nam
el
y i
)
O
bs
cu
rity
ii
)
Directi
ng
consolidat
e
d plan iii
)
Destr
uctive m
od
ific
at
ion
.
2.1
.
Ob
scuri
t
y
In
t
he
obscu
rity
based
pla
n,
a
strai
ght
cha
ng
e
is
co
nn
ect
e
d
to
the
first
in
f
orm
ation
,
w
her
e
the
c
hange
gr
i
d i
s
t
he a
rb
it
rar
y
gr
i
d.
This
strai
gh
t
cha
nge
is
deci
ph
e
re
d
as
a
li
ghtwei
gh
t
sy
m
m
e
tric
en
crypti
on
plo
t,
wh
e
re
the
ar
bitrary
gr
id
is
the
pri
vat
e
key.
I
n t
he c
om
pr
essive
dete
ct
ing
enc
ryptio
n pla
ns
[
7,
8
,
11]
, t
he
vector
s
iz
e
of
the
c
hange
co
m
es
ab
ou
t
is
su
bst
antia
ll
y
le
ss
tha
n
that
of
the
fi
rst
in
form
ation
,
w
hi
ch
im
plies
the
fir
s
t
inf
or
m
at
ion
is
pack
e
d
am
id
the
c
hange.
I
n
the
ra
ndom
iz
e
change
base
d
plan
[9,
10
]
,
t
he
co
nfusion
c
ha
ng
e
is
connecte
d
t
o
th
e
c
om
pr
essive
est
i
m
ation
com
es
about,
a
nd
t
he
vect
or
siz
e
of
the
e
stim
at
i
on
c
om
es
abo
ut
is
the
sam
e as that of the c
hange
res
ult.
2.2.
Direc
ting cons
olid
at
ed
plan
In
the
se p
la
ns
, e
ach sou
rce hu
b
pa
rtit
ion
s the
f
irst i
nfor
m
at
i
on
i
nto
a f
e
w
s
ect
ion
s a
nd
tra
n
sm
it
s
the
m
in
m
ult
i
-
way, w
hile
the
m
idd
le
of
the r
oa
d
hubs
m
akes
so
m
e
furthe
r
proce
dure.
In
c
ut
ble
nd
b
ase
d
plans
[12],
each
s
ource
hub
pa
rts
it
s
uni
qu
e
inf
orm
ation
int
o
a
fe
w
c
uts,
a
nd
enc
od
es
them
bef
ore
sen
ding
them
ou
t
i
n
m
ul
ti
path.
T
he
m
od
erate
hub
wi
ll
un
sc
ram
ble
these
c
uts
an
d
total
them
tog
et
he
r.
In
secu
r
e
syst
e
m
cod
in
g
base
d
plan
[
13
]
,
eac
h
sou
rce
hub
iso
la
te
s
the
first
i
nfor
m
at
ion
int
o
a
fe
w
squa
re
s
w
hat'
s
m
or
e,
dirtie
s
s
om
e
of
them
.
These
s
quares
are
co
nvey
ed
i
n
m
ulti
path,
w
hat'
s
m
or
e,
will
be
re
-
e
nc
od
e
d
in
the
m
od
e
r
at
e
hub.
Eac
h
so
urce
hub
a
dd
it
io
nally
pr
oduce
s
a
few
kinds
of
CR
Cs
and
enc
od
e
s
them
.
The
secur
it
y
of
s
qu
a
re
in
form
ation
i
s
accom
plished
t
hro
ugh
the
co
nt
a
m
inati
on
c
om
po
nen
t,
w
hic
h
is
in
reali
ty
a
s
or
t
of
c
onf
usi
on
syst
em
.
W
it
hout
un
s
cra
m
bling
t
hese
CR
Cs,
th
e
f
oe
is
as
ye
t
con
cei
vab
le
to
rec
up
e
rati
on
uniq
ue
s
quares
in
the
ev
ent
t
ha
t
go
t
enou
gh bu
nd
le
s.
2.3.
Des
truc
ti
ve
m
od
ific
at
i
on b
as
ed
sche
me
In
t
his
kind
of
plan,
the
i
nform
at
ion
protect
ion
is
accom
plished
by
a
pply
ing
a
r
uino
us
a
lt
era
ti
on
on
the
fir
st
inf
or
m
at
ion
.
F
or
in
sta
nce,
t
he
in
f
or
m
at
ion
sec
uri
ty
of
the
dif
f
eren
ti
al
pr
otect
ion
base
d
plan
[7
]
is
safegua
rd
e
d
by
di
ff
e
ren
ti
al
sec
ur
it
y
hypothesi
s,
w
her
e
the
a
r
bitrary
cl
am
or
is
a
dd
e
d
to
decre
ase
the
i
nfor
m
at
ion
certai
nty.
The
a
m
us
em
ent
hy
po
t
hesis
ba
sed
plans
[5,8
]
c
onte
m
plate
the
entra
nce
of
pr
i
vate
inf
orm
ati
on
by
util
iz
ing
m
on
e
ta
ry
ap
proac
he
s,
for
e
xam
ple,
am
us
em
ent
hypothesis
an
d
c
ontract
hypothesis.
Eac
h
so
urce
decides
it
s
sec
ur
it
y
le
vel
an
d
changes
it
s
inf
or
m
at
ion
in
vi
ew
of
the
har
m
on
y
th
ought
of
secur
it
y
an
d
r
eward.
Inform
at
ion
g
a
there
d by these
syst
e
m
s is r
eg
ularly
u
ti
li
zed
for pr
om
ote infor
m
at
ion
m
ini
ng.
2.4.
R
outing
Schemes
Pr
asa
d
et
.al
[16
]
pr
e
sente
d
dif
f
eren
t
r
outi
ng
te
chn
i
qu
e
s
i
n
t
he
I
oT.
A
n
at
ta
ck
m
od
el
is
us
e
d
for
r
ou
ti
ng
because
of
sec
ur
it
y
issues
in
the
IoT.
So
m
e
of
the
at
ta
ck
s
re
-
r
ou
te
the
pack
et
s
to
the
at
ta
cker
’s
co
nt
ro
ll
er
.
Thro
ugh
this
i
nfor
m
at
ion
,
t
he
r
ou
ti
ng
com
m
un
ic
at
ion
is
extracte
d.
M
ost
com
m
on
at
ta
cks
a
re
D
D
oS
,
Tra
ff
ic
hij
ac
king,
wh
i
ch
ex
plo
it
s
r
outi
ng
m
echan
i
sm
.
Paul
et
.al
[17]
pr
ese
nte
d
a
m
ulti
ho
p
protoc
ol
w
hich
us
e
s
m
ul
ti
ple
par
a
m
et
ers
f
or
sec
ur
e
r
outi
ng
whic
h
hav
e
par
ti
c
ular
i
nfo
rm
ati
on
al
rea
dy
known
as
prede
fined
f
or
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
A
AS
IS
S
N:
22
52
-
8938
A S
ec
ur
e
D
ata
Trans
missio
n S
chem
e
usi
ng A
symm
et
ric
Se
m
i
-
H
omomor
phic
… (
S.
N
agav
al
li
)
371
us
ers
.
Re
s
ourc
es
are
sto
red
as
r
ou
ti
ng
in
f
or
m
at
ion
.
Re
s
ults
are
s
how
ed
t
hat
sec
ur
e
m
ulti
-
ho
p
r
outi
ng
m
echan
ism
h
ad been
used
for I
oT
c
omm
un
ic
at
ion
.
Sale
e
m
et
.al
[15]
pro
pose
d
a
bi
o
-
ins
pire
d
s
ec
ur
e
IPv
6
c
omm
un
ic
at
io
n
proto
col
f
or
I
oT
.
T
he
y
enhance
d
the
lossy
netw
ork
a
nd
lo
w
powe
r
tra
ns
m
is
sion
by
cl
assif
ic
at
ion
al
gorit
hm
cal
le
d
arti
fici
al
i
m
m
un
e
syst
e
m
wh
ic
h
cl
assi
fies
the
m
isbehavi
ng
no
des
an
d
norm
al
nodes
with
l
ocal
i
nfo
rm
ation
.
T
hrough
the
cl
assifi
c
at
ion
detect
ion
of
e
xc
essive
broa
dc
ast
,
im
pr
ov
em
ents
in
pow
er
and
tra
ns
m
issio
n
rate
a
re
inc
r
eased.
Re
su
lt
s
pro
ved
that
tra
ns
m
issio
n
rate
an
d
en
erg
y
c
ons
um
pt
ion
is
far
bette
r
tha
n
pre
vious
ly
sta
te
of
art
r
ou
ti
ng
te
ch
niques
of
Io
T
.
Liu
et
.al
[
14]
pro
po
se
d
a
S
DN
base
d
I
oT
sec
ur
e
r
outi
ng
prot
oco
l.
T
he
issue
i
n
t
hes
e
I
oT
r
outi
ng
m
echan
ism
wit
h
S
DN
is
sec
uri
ty
m
idd
le
box
gu
a
r
d.
S
DN
se
cur
it
y
base
d
da
ta
tra
ns
fe
r
secu
rity
m
od
el
is
red
uc
i
ng
netw
ork
la
te
nc
y
an
d
m
anag
e
to
sec
ur
e
data
flo
w
with
t
he
help
of
he
ur
ist
ic
al
gorithm
s.
Mi
dd
le
bo
xes
with
secur
e
poli
ci
es
are
placed
at
diff
e
re
nt
locat
ion
s
.
Nex
t
t
o
ta
ckle
agai
ns
t
ch
ang
i
ng
of
m
idd
le
boxe
s
to
ho
neyp
ot.
They
us
e
offli
ne
intege
r
pro
gr
am
and
al
so
it
is
us
ed
to
lo
ad
bala
nce.
E
xperim
ents
are
dem
on
strat
ed
t
hat
thi
s
m
od
el
can
ha
ndle
sec
ur
e
r
ou
t
ing
m
echan
ism
for
I
oT.
3.
PROP
OSE
D E
NCRYPT
IO
N
S
CHE
ME
Com
pr
essive
detect
ing
base
d
e
ncr
y
ption
s
chem
e
is
basical
ly
an
asy
m
m
et
ric
e
ncr
ypt
ion
s
chem
e.
Fig
ure
1
s
how
s
the
a
rch
it
ect
ure
of
t
he
pro
po
sed
enc
ryptio
n
schem
e.
As
pe
r
t
he
m
at
te
r
of
the
fact,
asy
m
m
et
ri
c
encr
y
ption
sc
hem
es
are
costli
er
f
or
WSN
ap
plica
ti
on
s
wh
e
n
com
par
e
d
to
oth
e
r
enc
ryptio
n
sch
em
es.
Howev
e
r
,
these
sc
hem
es
can
be
m
ad
e
into
m
ini
m
alist
ic
and
ca
n
be
dep
l
oyed
i
n
se
ns
or
a
pp
li
cat
io
ns
f
or
bette
r
se
cur
it
y.
This
can
be
ac
hieve
d
by
li
m
i
t
ing
the
secu
rity
par
am
et
er
siz
es.
Ch
oo
si
ng
t
he
nu
m
ber
of
se
cur
it
y
par
am
et
ers
can
al
so
m
ake
the
s
chem
es
feasible
f
or
de
plo
ym
e
nt.
T
his
happe
ns
at
t
he
e
xp
e
nse
of
the
sec
ur
i
ty
of
t
he
sc
hem
e,
but
it
w
as fo
und
t
ha
t i
t st
il
l pr
ovid
es an
appr
opria
te
level o
f
sec
uri
ty
.
In
the
pro
pose
d
e
ncr
y
ption
sc
hem
e,
the
pu
blic
par
am
et
ers
c
ho
s
en
are
a
la
r
ger
posit
ive
i
nteger
g
w
hic
h
is
10
200
an
d
a
po
sit
ive
i
ntege
r
d
w
h
ic
h
is
great
er
than
t
wo,
as
per
the
ass
um
ption
.
H
enc
e
the
intege
r
g
sh
oul
d
al
ways
ha
ve
m
any
s
m
al
l
div
is
or
s
a
nd
al
so
m
any
integers
w
hich
are
sm
al
l
wh
e
n
it
is
i
nv
e
rted
m
od
ulo
g.
C
on
sider, t
he f
ollo
wing case
for v
al
idati
on
.
1.
The first ca
se
prop
os
ed
is that
d
s
houl
d no
t
be
great
er tha
n 4
and s
hould i
ncl
ud
e
the l
ow
e
r bou
nd 2.
2.
The
sec
ond ca
s
e is that
g
s
houl
d
not
be great
er th
a
n 2
32
.
The
li
st
of
pa
ra
m
et
ers
are
al
w
ay
s
a
posit
ive
i
ntege
r
r
∈
Zg
a
nd
a
posit
ive
integ
er
g`
wh
ic
h
i
nc
lud
e
lo
g
g
,
g
is
a
al
ways
a
secret
secu
rity
par
am
et
er.
Fin
al
ly
,
the
secret
key
of
the
sc
he
m
e
is
def
ine
d
as
(r,
g`)
.
He
nc
e
to
encr
y
pt
the
da
ta
f
ro
m
the
WSN,
m
∈
Z
g`
,
w
he
r
e
d
is
al
ways
a
ra
ndom
nu
m
ber
(S
1
to
S
d
)
s
houl
d
be
ge
ner
a
te
d
=
∑
=
1
′
and
s
j
>
Z
g
.
Furt
her,
the
ci
ph
e
r
te
xt
is
then
fou
nd
a
s
(
)
=
∑
=
1
′
.
Additi
on
al
ly
,
a
dd
it
io
n
a
nd
s
ubtract
io
n
a
re
t
o
be
done
co
m
po
nen
t
wise
wh
e
re
m
ulti
pli
cat
ion
a
nd
divi
sion
i
s
done by m
ulti
plyi
ng
the c
om
po
ne
nts
of Z
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2252
-
88
14
IJ
A
AS V
ol
.
7
,
No.
4
,
Decem
ber
2018
:
3
69
–
376
372
1
2
N
e
tw
o
r
k
c
o
n
tr
o
l
l
e
r
u
s
e
s
D
e
v
i
c
e
p
u
b
l
i
c
k
e
y
A
ES
-
1
2
8
A
ES
-
1
2
8
e
n
c
r
y
p
te
d
w
i
th
N
e
tw
o
r
k
k
e
y
A
ES
-
1
2
8
C
R
C
c
h
e
c
k
s
u
m
R
SA
-
5
1
2
R
SA
-
5
1
2
i
n
c
l
u
s
i
o
n
m
e
s
s
a
g
e
C
o
m
p
l
e
te
e
n
c
r
y
p
tr
e
d
m
e
s
s
a
g
e
3
.
T
r
a
n
s
m
i
tte
d
to
d
e
v
i
c
e
4
.
c
o
m
p
u
te
d
o
n
th
e
d
e
v
i
c
e
d
e
c
r
y
p
te
d
w
i
th
R
SA
-
5
1
2
D
e
v
i
c
e
p
r
i
v
a
te
k
e
y
A
ES
-
1
2
8
D
e
c
r
y
p
te
d
n
e
tw
o
r
k
k
e
y
C
o
n
tr
o
l
l
e
r
k
e
y
to
e
n
c
r
y
p
t
A
ES
-
1
2
8
c
r
e
a
te
Figure
1.
A
rch
i
te
ct
ur
e
of
t
he P
rop
os
ed
Crypt
o
-
Syst
em
f
or
WSN
4.
E
X
PERI
MEN
TAL SET
UP
The
pr
opos
e
d
en
crypti
on
s
chem
e
is
im
p
lem
ented
on
Node
Re
d
a
nd
t
he
no
des
are
de
plo
ye
d
ind
e
pende
ntly
to
m
on
it
or
th
e
wate
r
ta
nk
w
hich
c
on
ta
ins
sh
rim
ps
.
Ea
ch
node
is
e
xec
uted
t
o
r
un
e
ncry
ption
schem
e
in
orde
r
to
e
nsure
t
hat
each
node
c
om
m
un
ic
at
ion
is
encr
y
pted
.
A
chec
ks
um
is
create
d
a
nd
cert
ific
at
e
pinnin
g
is
al
s
o
ens
ur
e
d
in
al
l
nodes
i
n
order
to
ve
rify
the
a
uth
e
ntici
ty
of
nodes
a
nd
to
a
vo
i
d
the
no
de
cl
on
in
g
act
ivit
ie
s.
The
entire
sc
hem
e
i
s
i
m
ple
m
ented
us
in
g
python.
Figure
2
s
hows
the
arc
hitec
tur
e
of
se
ns
or.
Ta
ble
1
sh
ows
the
data
aggre
gation rat
e f
or
va
rio
us
si
ze o
f netw
ork.
O
n
b
o
a
r
d
m
e
m
o
r
y
Ma
i
n
p
r
o
c
e
s
s
i
n
g
u
n
i
t
O
n
b
o
a
r
d
c
r
y
p
to
-
p
r
o
c
e
s
s
i
n
g
s
y
s
te
m
Ex
te
r
n
a
l
m
e
m
o
r
y
T
r
a
n
s
c
e
i
v
e
r
A
n
a
l
o
g
to
D
i
g
i
ta
l
c
o
n
v
e
r
te
r
Se
n
s
i
n
g
e
n
v
i
r
o
n
m
e
n
t
Fig
ure
2
.
A
rch
i
te
ct
ur
e
of
t
he S
ens
or
De
plo
ym
ent
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
A
AS
IS
S
N:
22
52
-
8938
A S
ec
ur
e
D
ata
Trans
missio
n S
chem
e
usi
ng A
symm
et
ric
Se
m
i
-
H
omomor
phic
… (
S.
N
agav
al
li
)
373
Table
1.
E
nc
rypted Tra
ff
ic
A
naly
zed
for Va
rio
us
Iterati
on
with
In
c
rease
d Nu
m
ber
of No
des
2
5
no
d
es
Plain
tex
t
Ro
u
n
d
1
Ro
u
n
d
2
Ro
u
n
d
3
No
d
e
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
1
50
20
110
70
120
75
131
70
2
52
30
120
80
134
82
151
98
3
54
34
134
90
140
94
166
110
4
60
45
154
110
160
125
172
120
5
0
no
d
es
Plain
text
Ro
u
n
d
1
Ro
u
n
d
2
Ro
u
n
d
3
No
d
e
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
1
70
30
140
80
150
87
151
80
2
72
40
150
99
164
110
167
112
3
74
54
164
119
170
123
178
132
4
80
65
184
140
180
190
197
145
7
5
no
d
es
Plain
text
Ro
u
n
d
1
Ro
u
n
d
2
Ro
u
n
d
3
No
d
e
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
Tr
an
s
Receiv
1
80
40
156
99
166
90
165
100
2
97
55
167
112
176
112
176
123
3
99
67
187
123
187
132
187
154
4
110
76
198
154
199
212
210
198
4.1.
Perf
orm
ance
Anal
ys
is
The
fo
ll
owin
g
par
am
et
ers
are
sel
ect
ed
for
eval
uation
of
the
pro
po
se
d
asy
m
m
et
ric
encr
y
pti
on
al
gorithm
s f
or
bo
t
h
e
ncr
y
ptio
n
a
nd d
ec
rypti
on sc
hem
es.
1.
Encr
y
ption Ti
m
e
The
e
ncr
y
ption
tim
e
is
con
sid
ered
a
s
the
ti
m
e
that
an
e
nc
ryption
al
gorith
m
ta
kes
to
pr
oduce
s
a
ci
phert
ext
from
a p
la
in te
xt.
Fi
g.
4
a
nd F
ig. 6 s
hows
the
e
nc
ryptio
n
ti
m
e of
var
io
us fil
e size
.
2.
Decr
y
ption Ti
m
e
The
dec
ryptio
n
tim
e
is
co
ns
id
ered
as
the
ti
m
e
that
a
de
cryp
ti
on
al
gorithm
ta
kes
to
reprod
uces
a
plain
te
xt
from
a ciph
erte
xt.
Fi
gure
3
a
nd Fi
gure
5
s
ho
ws
th
e
decr
ypti
on tim
e o
f va
riou
s
f
il
e size
.
3.
Thro
ug
hput
Thro
ughput
is
eq
ual
to
total
plainte
xt
in
by
te
s
encr
ypte
d
div
i
ded
by
th
e
enc
ryptio
n
ti
m
e.
Higher
th
e
thr
oughput,
hi
gh
e
r wil
l be t
he
p
e
rfor
m
ance.
4.
Encr
y
pted Fi
le
Size
The
siz
e
of e
nc
rypted
f
il
e is c
al
le
d
enc
rypted
f
il
e size
.
5.
Decr
y
pted Fi
le
Size
The
siz
e
of
dec
rypted
f
il
e is c
al
le
d
dec
rypted
f
il
e size
.
Figure
3. Dec
r
ypti
on
Fil
e Siz
e (Prop
os
e
d H
om
o
m
or
phic
S
chem
e v
s Ex
ist
ing
H
om
o
m
or
phic
Sc
hem
e)
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2252
-
88
14
IJ
A
AS V
ol
.
7
,
No.
4
,
Decem
ber
2018
:
3
69
–
376
374
Figure
4. Enc
r
ypti
on
Fil
e Siz
e (Prop
os
e
d H
om
o
m
or
phic
S
chem
e v
s Ex
ist
ing
H
om
o
m
or
phic
Sc
hem
e)
Figure
5. Dec
r
ypti
on
Tim
e (P
rop
os
ed
Hom
om
or
ph
ic
Sc
he
m
e v
s E
xisti
ng Hom
o
m
or
phic
Sch
em
e)
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
A
AS
IS
S
N:
22
52
-
8938
A S
ec
ur
e
D
ata
Trans
missio
n S
chem
e
usi
ng A
symm
et
ric
Se
m
i
-
H
omomor
phic
… (
S.
N
agav
al
li
)
375
Figure
6. Enc
r
ypti
on
Tim
e (P
rop
os
ed
Hom
om
or
ph
ic
Sc
he
m
e v
s E
xisti
ng Hom
o
m
or
phic
Sch
em
e)
5.
CONCL
US
I
O
N
WSN
is
popula
r
in
inc
reasin
gl
y
gaining
po
pula
rity
in
m
os
t
of
the
a
pp
li
cat
io
ns
in v
ari
ou
s dom
ai
ns
.
In
order
t
o
pr
ov
i
de
secur
it
y
to
th
e
sens
or
node
com
m
un
ic
at
ion
,
this
pa
per
presented
a
hom
om
or
phic
encry
ption
schem
e
wh
ic
h
al
lows
data
pro
cessi
ng
on
a
node
en
c
ryptio
n.
Fu
rt
her
it
is
al
s
o
f
ound
that
t
he
pro
po
se
d
e
ncry
ptio
n
schem
e
is
f
or
al
l
so
rts
of
networks.
E
ven
if
the
netw
ork
siz
e
gr
ow
s
,
t
he
pro
po
se
d
sc
he
m
e
is
capa
ble
to
w
ork
on.
It
was
al
s
o
f
ound
t
hat
the
pro
pose
d
e
ncry
ption
schem
e
does
not
si
gn
i
ficantl
y
re
du
ce
the
pe
rfor
m
ance
of
plainte
xt
a
ggre
gation.
T
his
m
eans
that
t
he
propose
d
e
ncr
y
ption
sc
hem
e
is
feasible
f
or
WSN
a
pp
li
cat
ions
wh
il
e
consi
der
i
ng it
s
eff
ect
on n
et
w
ork
tra
ff
ic
.
REFERE
NCE
S
[1]
J.
H.
Cheon
et
al
.
,
“
Towa
rd
a
Sec
ure
Drone
S
y
st
em:
Fl
y
in
g
with
Real
-
T
i
m
e
Hom
om
orp
hic
Auth
ent
i
cat
ed
Enc
r
y
pt
ion”
,
In
I
EE
E
Acce
ss
,
vol
.
6
,
pp
.
24325
-
2
4339,
2018
.
[2]
H.
Chen
,
Y.
Hu
and
Z.
L
ia
n
,
“
Le
ve
le
d
Hom
om
orphic
En
cr
y
p
ti
on
in
Certifi
cate
l
ess
Cr
y
ptos
y
s
te
m
”,
In
Chin
ese
Journal
o
f
Elec
t
ronics
,
vol
.
26
,
n
o.
6
,
pp
.
1213
-
1
220,
2017
.
[3]
H.
Chen
,
Y.
Hu
and
Z.
L
ia
n,
“
Properties
of
SV
-
St
y
le
Hom
om
orp
hic
Enc
r
y
p
ti
on
a
nd
Th
ei
r
Applicati
on
”,
In
Chines
e
Journal
of
Elec
t
ronics
,
vol
.
26
,
n
o.
5
,
pp
.
926
-
93
2,
2017
.
[4]
B.
W
ang,
Y
.
Zh
a
n
and Z
.
Zha
ng
,
“
Cry
p
ta
n
aly
sis
o
f a
S
y
m
m
et
r
ic
F
ully
Hom
om
orp
hic
En
cr
y
pt
ion S
che
m
e”, In
I
EE
E
Tr
ansacti
ons on Inform
ati
on
For
ensic
s and
S
ec
ur
it
y
,
vol
.
13
,
no
.
6
,
pp
.
1460
-
1467
,
June
2018
.
[5]
L.
T
.
Phong,
Y.
Aono,
T
.
Ha
y
a
shi,
L.
W
ang
an
d
S.
Moria
i,
“
Privacy
-
Preserv
ing
Dee
p
Learni
ng
vi
a
Additiv
e
l
y
Hom
o
m
orphic
E
ncr
y
p
ti
on
”,
In
I
EE
E
Tr
ansacti
o
ns
on
Informatio
n
Forensic
s
and
Sec
urit
y
,
vol.
13
,
no.
5,
pp.
1333
-
1345,
Ma
y
2018
.
[6]
Alabdul
a
ti
f,
H.
Kum
ara
ge,
I
.
K
hal
il,
M.
Atiquzza
m
an
and
X.
Yi,
“
Privacy
-
pr
e
serving
cl
oud
-
b
ase
d
billing
wi
t
h
li
ghtw
ei
gh
t
hom
om
orphic
enc
r
y
p
ti
on
for
sensor
-
e
nabl
ed
sm
art
gr
i
d
infra
stru
ct
ure
”
,
In
IET
W
irel
ess
Sensor Sy
stems
,
vol.
7
,
no
.
6
,
pp
.
182
-
190,
12
201
7.
[7]
L.
Chen
,
M.
Lim
and
Z.
Fan,
“
A
Public
Ke
y
C
om
pre
ss
ion
Sch
eme
for
Full
y
Hom
om
orphic
Enc
r
y
p
ti
on
B
ase
d
on
Quadra
ti
c
Par
amete
rs With
Corre
ct
ion
”, I
n
IE
EE
Ac
c
ess
,
vol
.
5
,
p
p.
17692
-
17700
,
2017.
[8]
K.
L
aut
er
,
“
Pos
t
quant
um
Opport
unit
ie
s:
L
at
t
ices,
Hom
om
orphic
Enc
r
y
pt
ion,
and
Supersingula
r
I
sogen
y
Graphs”
,
In
IEEE
S
ec
urit
y
&
P
rivac
y
,
vol
.
15,
no
.
4
,
pp
.
22
-
27,
2017
.
[9]
Y.
Ma,
L
.
W
u,
X.
Gu,
J.
He
and
Z.
Yang
,
“
A Sec
ure
Fac
e
-
Veri
f
i
ca
t
ion
Scheme
B
ase
d
on
Hom
omorphi
c
En
cr
y
pti
o
n
and
Dee
p
Neur
al Net
works
”, I
n
I
EE
E
Acce
ss
,
vol
.
5
,
pp
.
16532
-
1
6538,
2017
.
[10]
N. D
owlin,
R.
G
il
ad
-
B
ac
hra
ch,
K. La
in
e,
K
.
La
u
te
r,
M
.
Nae
hrig
and J
.
W
ern
sing,
“
Manu
al
for U
sing
Hom
o
m
orphic
Enc
r
y
pt
ion
for
B
ioi
nform
at
i
cs”
,
I
n
Proceedi
ngs o
f
the IEEE
,
vol
.
1
05,
no
.
3
,
pp
.
55
2
-
567,
Mar
ch
20
17.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2252
-
88
14
IJ
A
AS V
ol
.
7
,
No.
4
,
Decem
ber
2018
:
3
69
–
376
376
[11]
Khedr
and
G.
G
ula
k,
“
Secur
eMe
d:
Se
cur
e
Medi
c
al
Com
puta
ti
on
Us
ing
GP
U
-
Acc
el
er
at
ed
Hom
om
orphic
Enc
r
y
pti
o
n
Scheme”
,
In
I
EEE
Journal
of
Bi
o
medic
al
and
He
alt
h
In
formatic
s
,
vol. 22, no. 2, p
p.
597
-
606
,
Mar
ch
2018.
[12]
M.
S.
L
ee,
“
Sparse
subs
et
sum
p
roble
m
from
Ge
ntr
y
–
Ha
le
v
i
'
s
ful
l
y
hom
om
orphic
en
cr
y
pti
on
”,
In
IET
Informatio
n
Sec
urit
y
,
vol. 11, no. 1, pp. 34
-
37
,
2017
.
[13]
R.
Bocu
and
C.
Costac
he
,
“
A ho
m
om
orphic
enc
r
y
pt
ion
-
base
d
s
y
s
te
m
for
se
cur
e
l
y
m
ana
ging
pe
rsonal
h
ea
l
th
m
et
r
ics
dat
a
”, I
n
I
BM Jo
urnal
of Re
searc
h
and
De
ve
lopm
ent
,
vol
.
62
,
no
.
1,
pp
.
1:1
-
1
:10, Jan.
-
Feb.
1
2
018.
[14]
Y. L
iu,
Y.
Kuan
g,
Y
.
Xi
ao
and
G
.
Xu
,
“
SD
N
-
Based Da
ta
Tr
ansfe
r
Secur
ity
for
Int
e
rne
t
of
Thi
ngs”
,
In
IE
EE
Int
erne
t
of
Things
Journ
al
,
vo
l. 5, no. 1,
pp.
257
-
268
,
Fe
b.
2018
.
[15]
K.
Sale
em,
J
.
C
haudhr
y
,
M.
A
.
Orgun
and
J.
Al
-
Muhtadi
,
“
A
bi
o
-
inspire
d
sec
ur
e
IPv6
comm
unic
ation
protoc
o
l
f
or
Inte
rne
t
o
f
Thi
ng
s”,
2017
El
ev
enth
Int
ern
ation
a
l
C
onfe
ren
c
e
on
Se
nsing
T
ec
hnolog
y
(ICST),
pp
.
1
-
6,
S
y
dne
y
,
NS
W
,
2017.
[16]
Prasad,
Sh
y
am
Sundar,
and
Chana
k
y
a
Ku
m
ar,
“
An
ene
r
g
y
eff
i
ci
en
t
an
d
rel
i
able
in
ternet
of
thi
ngs”
,
In
Comm
unic
ation,
Information
&
C
o
mputing
Te
chnol
ogy
(
ICCICT
)
,
pp.
1
-
4,
IE
EE
,
2012.
[17]
Pau
l
AS
W
ard
,
Eva
n
PC
,
Mart
i
n
Karste
n
,
and
J
ones,
“
Multi
p
at
h
loa
d
ba
la
nc
ing
in
m
ult
i
-
hop
wir
el
ess
ne
tworks”,
In
Wirel
ess
An
d
Mobil
e
Computing,
N
et
wor
ki
ng
And
Comm
unic
ati
ons
,
(
WiMob'2005)
,
IEE
E
In
te
rn
at
io
na
l
Confer
ence, vol
.
2,
pp.
158
-
166,
2005.
BIOGR
AP
HI
ES
OF
A
UTH
ORS
Dr.G.
Ramacha
n
dra
n
re
ceive
d
t
he
B.
E
deg
ree
in
Com
pute
r
Scie
nc
e
and
En
gine
er
ing
from
Annam
al
ai
Univ
ersity
in
1997
.
H
e
re
ceive
d
the
M.E
d
egr
e
e
in
Co
m
pute
r
Scie
n
ce
and
Eng
ineeri
ng
from
Annam
al
ai
Univer
sit
y
in
th
e
y
e
ar
2005.
He
h
as
be
en
with
An
namala
i
Univ
ersity
,
sinc
e
2000.
He com
ple
t
ed hi
s
Ph.D
degr
ee
in
Com
pute
r S
cien
ce
and Eng
ineeri
ng
at
Ann
amala
i
Univer
sit
y
,
in
the
y
e
ar
2014.
He
publi
shed
30
pape
rs
in
Int
er
nat
ion
al
conf
erence
s
and
Journa
ls.
His
rese
ar
ch
int
er
est
includes
Com
pute
r
Net
works
,
Network
Secur
ity
,
W
ire
l
ess
Networks,
Mobile
Ad
hoc
net
works
and
Io
T.
S.
Naga
v
alli
re
c
ei
ved
th
e
B.
Sc
degr
ee
in
Com
p
ute
r
Scie
n
ce
fro
m
CKN
col
l
ege
in
2002
.
She
complet
ed
her
M
.
C.
A
degr
ee
fro
m
AV
C
col
le
ge
i
n
the
y
e
ar
2005.
She
recei
ved
her
M.Phil
degr
ee
from
Annam
al
ai
Univer
sit
y
in
20
08.
She
is
do
ing
her
Ph.D
degr
ee
in
Depa
rtmen
t
of
Com
pute
r
and
Inform
at
ion
Sci
enc
e
at
Annam
al
a
i
Univer
si
t
y
.
She
has
pub
lis
hed
3
pap
ers
i
n
Inte
rn
at
ion
a
l
Journals.
H
er
area
of
in
te
r
est
incl
udes
Int
ern
e
t
of
Thi
ngs,
Cr
y
pt
og
rap
h
y
,
and
Com
pute
r
Networks.
Evaluation Warning : The document was created with Spire.PDF for Python.