{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:49:54Z","timestamp":1770230994599,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00143-3","type":"journal-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T16:11:32Z","timestamp":1745338292000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications"],"prefix":"10.1007","volume":"5","author":[{"given":"Zaineb","family":"Naaz","sequence":"first","affiliation":[]},{"given":"Gamini","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Vidushi","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"143_CR1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0268-2","author":"S Kumar","year":"2019","unstructured":"Kumar S, Tiwari P, Zymbler M. Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data. 2019. https:\/\/doi.org\/10.1186\/s40537-019-0268-2.","journal-title":"J Big Data"},{"key":"143_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2016.2579198","volume":"4662","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE Inter Things J. 2016;4662:1\u201310. https:\/\/doi.org\/10.1109\/JIOT.2016.2579198.","journal-title":"IEEE Inter Things J"},{"key":"143_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/en13020494","author":"NH Motlagh","year":"2020","unstructured":"Motlagh NH, Mohammadrezaei M. Internet of things (IoT) and the energy sector. Energies. 2020. https:\/\/doi.org\/10.3390\/en13020494.","journal-title":"Energies"},{"issue":"2","key":"143_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.12785\/IJCDS\/090214","volume":"9","author":"AR Khan","year":"2020","unstructured":"Khan AR, Chishti MA. Data aggregation mechanisms in the internet of things: a study, qualitative and quantitative analysis. Int J Comput Digit Syst. 2020;9(2):289\u201397. https:\/\/doi.org\/10.12785\/IJCDS\/090214.","journal-title":"Int J Comput Digit Syst"},{"key":"143_CR5","doi-asserted-by":"publisher","unstructured":"JoshiG, Sharma V. Light-Weight hidden markov trust evaluation model for IoT network. In: Proc. 5th Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2021, pp. 142\u2013149, 2021, https:\/\/doi.org\/10.1109\/I-SMAC52330.2021.9640885.","DOI":"10.1109\/I-SMAC52330.2021.9640885"},{"key":"143_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04403-w","author":"G Joshi","year":"2022","unstructured":"Joshi G, Sharma V. A robust and trusted framework for IoT networks. J Ambient Intell Humaniz Comput. 2022. https:\/\/doi.org\/10.1007\/s12652-022-04403-w.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"143_CR7","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s11277-022-10007-6","volume":"128","author":"G Joshi","year":"2023","unstructured":"Joshi G, Sharma V. Hidden markov trust for attenuation of selfish and malicious nodes in the IoT network. Wirel Pers Commun. 2023;128(2):1437\u201369. https:\/\/doi.org\/10.1007\/s11277-022-10007-6.","journal-title":"Wirel Pers Commun"},{"issue":"July 2019","key":"143_CR8","doi-asserted-by":"publisher","first-page":"111610","DOI":"10.1016\/j.enpol.2020.111610","volume":"144","author":"J Batalla-Bejerano","year":"2020","unstructured":"Batalla-Bejerano J, Trujillo-Baute E, Villa-Arrieta M. Smart meters and consumer behaviour\u202f: Insights from the empirical literature. Energy Policy. 2020;144(July 2019):111610. https:\/\/doi.org\/10.1016\/j.enpol.2020.111610.","journal-title":"Energy Policy"},{"issue":"4","key":"143_CR9","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.kjs.2023.02.028","volume":"50","author":"R Venkataraman","year":"2023","unstructured":"Venkataraman R, Alhamadi H. Trustworthy data provisioning for IoT-Based circadian health evaluation systems. Kuwait J Sci. 2023;50(4):492\u20138. https:\/\/doi.org\/10.1016\/j.kjs.2023.02.028.","journal-title":"Kuwait J Sci"},{"key":"143_CR10","doi-asserted-by":"publisher","unstructured":"NaazZ, Joshi G, Sharma V. Secure and Efficient Edge Computing Framework For IoT. 2023. pp. 6\u201310. https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10307200.","DOI":"10.1109\/ICCCNT56998.2023.10307200"},{"key":"143_CR11","doi-asserted-by":"publisher","unstructured":"NaazZ, Sharma V. Performance Analysis of Edge Node in IoT Network. In: Proc Int Conf Comput Power Commun Technol IC2PCT 2024. 2024;5:546\u2013551. https:\/\/doi.org\/10.1109\/IC2PCT60090.2024.10486497.","DOI":"10.1109\/IC2PCT60090.2024.10486497"},{"key":"143_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2021.100616","volume":"41","author":"A Alamer","year":"2021","unstructured":"Alamer A. Security and privacy-awareness in a software-defined fog computing network for the Internet of Things. Opt Switch Netw. 2021;41: 100616. https:\/\/doi.org\/10.1016\/j.osn.2021.100616.","journal-title":"Opt Switch Netw"},{"issue":"10","key":"143_CR13","doi-asserted-by":"publisher","first-page":"8056","DOI":"10.1109\/JIOT.2020.3042204","volume":"8","author":"F Rezaeibagha","year":"2021","unstructured":"Rezaeibagha F, Mu Y, Huang K, Chen L. Secure and efficient data aggregation for IoT monitoring systems. IEEE Internet Things J. 2021;8(10):8056\u201363. https:\/\/doi.org\/10.1109\/JIOT.2020.3042204.","journal-title":"IEEE Internet Things J"},{"key":"143_CR14","doi-asserted-by":"crossref","unstructured":"BellJH, Bonawitz KA, Gasc\u00f3n A, Raykova M. Secure Single-Server Aggregation with (Poly) Logarithmic Overhead. 2020. pp. 1253\u20131269.","DOI":"10.1145\/3372297.3417885"},{"issue":"3","key":"143_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-018-0413-5","volume":"18","author":"K Grining","year":"2019","unstructured":"Grining K, Klonowski M, Syga P. On practical privacy-preserving fault-tolerant data aggregation. Int J Inf Secur. 2019;18(3):285\u2013304. https:\/\/doi.org\/10.1007\/s10207-018-0413-5.","journal-title":"Int J Inf Secur"},{"key":"143_CR16","doi-asserted-by":"publisher","unstructured":"Liu Y, Guo W, Fan C, Chang L, Cheng C. A practical privacy-preserving data aggregation (3PDA) Scheme for Smart Grid. 2018. https:\/\/doi.org\/10.1109\/TII.2018.2809672.","DOI":"10.1109\/TII.2018.2809672"},{"issue":"X","key":"143_CR17","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access. 2017;5(X):3302\u201312. https:\/\/doi.org\/10.1109\/ACCESS.2017.2677520.","journal-title":"IEEE Access"},{"issue":"1\u20132","key":"143_CR18","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s11042-019-07874-w","volume":"79","author":"C Jiang","year":"2020","unstructured":"Jiang C, Pang Y. Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl. 2020;79(1\u20132):693\u2013711. https:\/\/doi.org\/10.1007\/s11042-019-07874-w.","journal-title":"Multimed Tools Appl"},{"key":"143_CR19","doi-asserted-by":"publisher","unstructured":"Gupta P, Sinha A, Kr. Srivastava P, Perti A, Singh AK. Security implementations in IoT using digital signature, vol. 661. Springer Singapore, 2021. https:\/\/doi.org\/10.1007\/978-981-15-4692-1_40.","DOI":"10.1007\/978-981-15-4692-1_40"},{"key":"143_CR20","unstructured":"JoshiT. RSA and Digital Signatures. [Online]. Available: https:\/\/www.geeksforgeeks.org\/rsa-and-digital-signatures\/"},{"issue":"8","key":"143_CR21","doi-asserted-by":"publisher","first-page":"58","DOI":"10.23919\/JCC.2020.08.005","volume":"17","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhang Q, Ji S, Bai W. PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC. China Commun. 2020;17(8):58\u201369. https:\/\/doi.org\/10.23919\/JCC.2020.08.005.","journal-title":"China Commun."},{"key":"143_CR22","doi-asserted-by":"publisher","unstructured":"BaiFE, Mou HH, Sun J. Power-efficient zoning clustering algorithm for wireless sensor networks. In: Proc 2009 Int Conf Inf Eng Comput Sci ICIECS 2009. 2009. https:\/\/doi.org\/10.1109\/ICIECS.2009.5362734.","DOI":"10.1109\/ICIECS.2009.5362734"},{"key":"143_CR23","doi-asserted-by":"publisher","first-page":"184438","DOI":"10.1109\/ACCESS.2019.2961270","volume":"7","author":"H Mahdikhani","year":"2019","unstructured":"Mahdikhani H, Mahdavifar S, Lu R, Zhu H, Ghorbani AA. Achieving privacy-preserving subset aggregation in fog-enhanced IoT. IEEE Access. 2019;7:184438\u201347. https:\/\/doi.org\/10.1109\/ACCESS.2019.2961270.","journal-title":"IEEE Access"},{"key":"143_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.jnca.2018.09.019","volume":"125","author":"Z Guan","year":"2019","unstructured":"Guan Z, et al. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl. 2019;125:82\u201392. https:\/\/doi.org\/10.1016\/j.jnca.2018.09.019.","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"143_CR25","doi-asserted-by":"publisher","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","volume":"6","author":"X Li","year":"2019","unstructured":"Li X, Liu S, Wu F, Kumari S, Rodrigues JJPC. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 2019;6(3):4755\u201363. https:\/\/doi.org\/10.1109\/JIOT.2018.2874473.","journal-title":"IEEE Internet Things J"},{"issue":"October 2018","key":"143_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2018.09.018","volume":"126","author":"T Li","year":"2019","unstructured":"Li T, Gao C, Jiang L, Pedrycz W, Shen J. Publicly verifiable privacy-preserving aggregation and its application in IoT. J Netw Comput Appl. 2019;126(October 2018):39\u201344. https:\/\/doi.org\/10.1016\/j.jnca.2018.09.018.","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"143_CR27","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JIOT.2019.2961966","volume":"7","author":"K Xue","year":"2020","unstructured":"Xue K, Zhu B, Yang Q, Wei DSL, Guizani M. An efficient and robust data aggregation scheme without a trusted authority for smart grid. IEEE Internet Things J. 2020;7(3):1949\u201359. https:\/\/doi.org\/10.1109\/JIOT.2019.2961966.","journal-title":"IEEE Internet Things J"},{"key":"143_CR28","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ins.2019.12.007","volume":"514","author":"X Shen","year":"2020","unstructured":"Shen X, Zhu L, Xu C, Sharif K, Lu R. A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Inf Sci (Ny). 2020;514:118\u201330. https:\/\/doi.org\/10.1016\/j.ins.2019.12.007.","journal-title":"Inf Sci (Ny)"},{"issue":"7","key":"143_CR29","doi-asserted-by":"publisher","first-page":"6132","DOI":"10.1109\/JIOT.2019.2957314","volume":"7","author":"A Saleem","year":"2020","unstructured":"Saleem A, Khan A, Ur S, Malik R, Pervaiz H. FESDA: fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet Things J. 2020;7(7):6132\u201342. https:\/\/doi.org\/10.1109\/JIOT.2019.2957314.","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"143_CR30","doi-asserted-by":"publisher","first-page":"5254","DOI":"10.1109\/JIOT.2021.3109153","volume":"9","author":"L Wu","year":"2022","unstructured":"Wu L, Xu M, Fu S, Luo Y, Wei Y. FPDA: fault-tolerant and privacy-enhanced data aggregation scheme in fog-assisted smart grid. IEEE Internet Things J. 2022;9(7):5254\u201365. https:\/\/doi.org\/10.1109\/JIOT.2021.3109153.","journal-title":"IEEE Internet Things J"},{"issue":"December 2019","key":"143_CR31","doi-asserted-by":"publisher","first-page":"101713","DOI":"10.1016\/j.sysarc.2020.101713","volume":"106","author":"P Zeng","year":"2020","unstructured":"Zeng P, Pan B, Choo KKR, Liu H. MMDA: multidimensional and multidirectional data aggregation for edge computing-enhanced IoT. J Syst Archit. 2020;106(December 2019):101713. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101713.","journal-title":"J Syst Archit"},{"issue":"October 2020","key":"143_CR32","doi-asserted-by":"publisher","first-page":"102522","DOI":"10.1016\/j.scs.2020.102522","volume":"64","author":"HM Khan","year":"2021","unstructured":"Khan HM, Khan A, Jabeen F, Rahman AU. Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids. Sustain Cities Soc. 2021;64(October 2020):102522. https:\/\/doi.org\/10.1016\/j.scs.2020.102522.","journal-title":"Sustain Cities Soc"},{"key":"143_CR33","doi-asserted-by":"crossref","unstructured":"Li H, Cheng Q, Li X, Ma S, Ma J. Lightweight and fine-grained privacy-preserving data aggregation scheme in edge computing. 2022;16(2):1832\u20131842.","DOI":"10.1109\/JSYST.2021.3112581"},{"issue":"15","key":"143_CR34","doi-asserted-by":"publisher","first-page":"13649","DOI":"10.1109\/JIOT.2023.3262731","volume":"10","author":"Y Chen","year":"2023","unstructured":"Chen Y, Yang S, Martinez-Ortega JF, Lopez L, Yang Z. A resilient group-based multisubset data aggregation scheme for smart grid. IEEE Internet Things J. 2023;10(15):13649\u201361. https:\/\/doi.org\/10.1109\/JIOT.2023.3262731.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"143_CR35","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1109\/TDSC.2023.3252593","volume":"21","author":"L Wu","year":"2024","unstructured":"Wu L, Fu S, Luo Y, Yan H, Shi H, Xu M. A robust and lightweight privacy-preserving data aggregation scheme for smart grid. IEEE Trans Dependable Secur Comput. 2024;21(1):270\u201383. https:\/\/doi.org\/10.1109\/TDSC.2023.3252593.","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"3","key":"143_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-022-09619-w","volume":"20","author":"M Ataei Nezhad","year":"2022","unstructured":"Ataei Nezhad M, Barati H, Barati A. An authentication-based secure data aggregation method in internet of things. J Grid Comput. 2022;20(3):1\u201328. https:\/\/doi.org\/10.1007\/s10723-022-09619-w.","journal-title":"J. Grid Comput."},{"key":"143_CR37","doi-asserted-by":"publisher","unstructured":"PaillierP. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. 1999;1592: 223\u2013228. https:\/\/doi.org\/10.1007\/3-540-48910-X_9.","DOI":"10.1007\/3-540-48910-X_9"},{"issue":"4","key":"143_CR38","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/JSAC.2011.110417","volume":"29","author":"M Pan","year":"2011","unstructured":"Pan M, Sun J, Fang Y. Purging the back-room dealing: secure spectrum auction leveraging paillier cryptosystem. IEEE J Sel Areas Commun. 2011;29(4):866\u201376. https:\/\/doi.org\/10.1109\/JSAC.2011.110417.","journal-title":"IEEE J Sel Areas Commun"},{"key":"143_CR39","doi-asserted-by":"publisher","unstructured":"Kumar P, Sharma SK. An empirical evaluation of various digital signature scheme in wireless sensor network. In: IETE Tech Rev (Institution Electron. Telecommun. Eng. India), 2022;39(4): 974\u2013984. https:\/\/doi.org\/10.1080\/02564602.2021.1937350.","DOI":"10.1080\/02564602.2021.1937350"},{"key":"143_CR40","first-page":"102","volume":"8","author":"E Wright","year":"2017","unstructured":"Wright E. Mapping and recreating digital signature algorithms using MATLAB. Anal Appl Math. 2017;8:102.","journal-title":"Anal Appl Math"},{"issue":"3","key":"143_CR41","doi-asserted-by":"publisher","first-page":"2886","DOI":"10.1109\/COMST.2019.2899354","volume":"21","author":"P Kumar","year":"2019","unstructured":"Kumar P, Lin Y, Bai G, Paverd A, Dong JS, Martin A. Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Commun Surv Tutorials. 2019;21(3):2886\u2013927. https:\/\/doi.org\/10.1109\/COMST.2019.2899354.","journal-title":"IEEE Commun Surv Tutorials"},{"key":"143_CR42","doi-asserted-by":"publisher","DOI":"10.4337\/9781784719463.00026","author":"JM Urban","year":"2016","unstructured":"Urban JM. Privacy issues in smart grid deployment. Res Handb Intellect Prop Clim Chang. 2016. https:\/\/doi.org\/10.4337\/9781784719463.00026.","journal-title":"Res Handb Intellect Prop Clim Chang"},{"issue":"April","key":"143_CR43","first-page":"121","volume":"8","author":"S Farah","year":"2012","unstructured":"Farah S, Javed MY, Shamim A, Nawaz T. An experimental study on performance evaluation of asymmetric encryption algorithms. Recent advaces Inf Sci. 2012;8(April):121\u20134.","journal-title":"Recent advaces Inf Sci"},{"key":"143_CR44","unstructured":"WanderAS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography on small wireless devices public-key authentication. 2005. pp. 1\u201316."},{"key":"143_CR45","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comnet.2019.01.022","volume":"151","author":"X Li","year":"2019","unstructured":"Li X, Zhou Z, Guo J, Wang S, Zhang J. Aggregated multi-attribute query processing in edge computing for industrial IoT applications. Comput Networks. 2019;151:114\u201323. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.022.","journal-title":"Comput Networks"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00143-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00143-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00143-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T16:11:36Z","timestamp":1745338296000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00143-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["143"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00143-3","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"9 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"42"}}