{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:48:46Z","timestamp":1777704526043,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,5,29]]},"abstract":"<jats:p>Wireless sensor networks (WSNs) is a network of resource constrained sensors deployed in unattended region for environmental monitoring. The resource constrained and ad-hoc nature of WSN stances lot of challenges to the research community when designing protocols for such environments. Now a days WSN is widely deployed from environmental monitoring to military applications. So secure data transmission is mandated in WSNs when it is used for mission critical applications. Data aggregation is a widely used method in WSNs for reducing communication overhead by mitigating unwanted data transmissions. But upholding accuracy of such aggregated data and providing security for the same is a challenging task. In this paper we propose Cluster based Concealed data Aggregation for Confidentiality and Integrity(C-CASIN) in WSN. It uses Elliptic Curve Cryptography based Elgamal additive homomorphic encryption scheme for providing Confidentiality and Integrity.EC-Elgamal Signature algorithm supports for authenticity. By supporting end-to-end encryption proposed method provides security with reduced computation and communication overheads. Results show that proposed method defend against various possible attacks and malicious behavior with the extended network lifetime of 15 to 20 percentage when comparing with basic secure model.<\/jats:p>","DOI":"10.3233\/jifs-179728","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T11:54:20Z","timestamp":1586519660000},"page":"6475-6482","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Energy measure cluster based concealed aggregation for confidentiality and integrity in WSN"],"prefix":"10.1177","volume":"38","author":[{"given":"T.","family":"Suriya Praba","sequence":"first","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India"}]},{"given":"V.","family":"Meena","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India"}]},{"given":"T.","family":"Sethukarasi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, R.M.K Engineering College, Kavarapettai, Chennai, India"}]},{"given":"K.","family":"Prachetha","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India"}]},{"given":"B.","family":"Aravind","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India"}]},{"given":"K.C.S.","family":"Bharathkumar","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India"}]}],"member":"179","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.11.010"},{"key":"e_1_3_1_3_2","unstructured":"AuthorsF. Article information: (2015)."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","unstructured":"LiuC. LuoJ. and SongY. Correlative pattern based data aggregation mechanism for WSN 31 (2016) 991\u2013999. doi: 10.3233\/JIFS-169028","DOI":"10.3233\/JIFS-169028"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2010.80"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","unstructured":"YassenM.B. AljawaernehS. and AbdulraziqR. Based on Internet of Things for Wireless Sensor 2016 International Conference on Engineering & MIS (ICEMIS). (2016) 1\u20139. doi:10.1109\/ICEMIS.2016.7745310.","DOI":"10.1109\/ICEMIS.2016.7745310"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2897119"},{"key":"e_1_3_1_8_2","first-page":"80","volume":"8","author":"Pradesh M.","year":"2017","unstructured":"PradeshM., PawarM., PradeshM., AgarwalJ. and PradeshM., A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network8 (2017), 80\u201383.","journal-title":"A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","unstructured":"SaravananP. and SethukarasiT. Optimal Hop Selection Based Novel Trust Based DDoS Attack Removal Framework for Reliable and Secured Transmission of Data in VANETs Wireless Personal Communications (2019) doi:10.1007\/s11277-019-06385-z.","DOI":"10.1007\/s11277-019-06385-z"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","unstructured":"ElhosenyM. YuanX. El-minirH.K. and RiadA.M. An energy efficient encryption method for secure dynamic WSN (2016) 2024\u20132031. doi:10.1002\/sec.","DOI":"10.1002\/sec"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.02.008"},{"key":"e_1_3_1_12_2","unstructured":"ChelliK. Security Issues in Wireless Sensor Networks: Attacks and Countermeasures I (2015)."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","unstructured":"KhanF. Secure Communication and Routing Architecture in Wireless Sensor Networks 2014 IEEE 3rd Global Conference onConsumer Electronics (GCCE) (2014) 647\u2013650. doi:10.1109\/GCCE.2014.7031298.","DOI":"10.1109\/GCCE.2014.7031298"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2293093"},{"key":"e_1_3_1_15_2","unstructured":"GuptaB.B. Computer and Cyber Security: Principles Algorithm Applications and Perspectives CRC Press 2018."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","unstructured":"CaoN. LiuP. LiG. ZhangC. CaoS. CaoG. YanM. and GuptaB.B. Evaluation models for the nearest closer routing protocol in wireless sensor networks IEEE Access6 (2018) 77043\u201377054. doi: 10.1109\/ACCESS.2018.2825441","DOI":"10.1109\/ACCESS.2018.2825441"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1857-x"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2998-6"},{"key":"e_1_3_1_19_2","unstructured":"UgusO. WesthoffD. LaueR. ShoufanA. and HussS.A. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks Proc. 2ndWorkshop Embedded Syst. Secur. (WESS) (2007) 11\u201316."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.11.001"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2633-6"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","unstructured":"BenS. AbdullahO. BahattabA. TradA. and YoussefH. Confidentiality and integrity for data aggregation in WSN using homomorphic encryption (2015) 867\u2013889. doi:10.1007\/s11277-014-2061-z.","DOI":"10.1007\/s11277-014-2061-z"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","unstructured":"LiL. El-latifA.A.A. and NiuX. Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images 92 (2012) 1069\u20131078. doi: 10.1016\/j.sigpro.2011.10.020","DOI":"10.1016\/j.sigpro.2011.10.020"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"BonehD. LynnB. and GentryC. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps International conference on theory and applications of cryptographic techniques Springer Berlin pp. 416\u2013432.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","unstructured":"GilbertHenri \u201cAdvances in Cryptology -EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques\u201d French Riviera May 30\u2013June 3 2010.","DOI":"10.1007\/978-3-642-13190-5"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179728","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179728","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:24Z","timestamp":1777455684000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,8]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5,29]]}},"alternative-id":["10.3233\/JIFS-179728"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179728","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,8]]}}}