{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:16:25Z","timestamp":1769714185367,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,7,2]]},"abstract":"<jats:p>Industrial revolutions and demand of novel applications drive the development of sensors which offer continuous monitoring of remote hostile areas by collecting accurate measurement of physical phenomena. Data aggregation is considered as one of the significant energy-saving mechanism of resource constraint Wireless Sensor Networks (WSNs) which reduces bandwidth consumption by eliminating redundant data. Novel applications demand WSN to provide information about the monitoring region in multiple aspects in large scale. To meet this requirement, different kinds of sensors of different parameters are deployed in the same region which in turn demands the aggregator node to integrate diverse data in a smooth and secure manner. Novelty in applications also requires Base station (BS) to apply multiple statistical functions. Hence, we propose to develop a novel secure cost-efficient data aggregation scheme based on asymmetric privacy homomorphism to aggregate data of multiple parameters and facilitate the BS to compute multiple functions in one round of data collection by providing elaborated view of monitoring region. To meet the claim of large scale WSN which requires dynamic change in size, vector-based data collection method is adopted in our proposed scheme. The security aspect is strengthened by allowing BS to verify the authenticity of source node and validity of data received. The performance of the system is analyzed in terms of computation and communication overhead using the mathematical model and simulation results.<\/jats:p>","DOI":"10.3233\/jifs-223511","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T12:51:37Z","timestamp":1682081497000},"page":"1453-1472","source":"Crossref","is-referenced-by-count":0,"title":["Integrity assured multi-functional multi-application secure data aggregation in wireless sensor networks (IAMFMA-SDA)"],"prefix":"10.1177","volume":"45","author":[{"given":"D.","family":"Vinodha","sequence":"first","affiliation":[{"name":"CSE, CHRIST (Deemed to be University), Bengaluru, India"}]},{"given":"E.A.","family":"Mary Anita","sequence":"additional","affiliation":[{"name":"CSE, CHRIST (Deemed to be University), Bengaluru, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-223511_ref1","first-page":"325","article-title":"Evaluating 2-DNF Formulas on Ciphertexts","volume":"3378","author":"Boneh Dan","year":"2005","journal-title":"Proc. Second Int\u2019l Conf. Theory of Cryptography (TCC)"},{"issue":"7","key":"10.3233\/JIFS-223511_ref2","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1109\/TKDE.2012.94","article-title":"CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks","volume":"25","author":"Lin Yue-Hsun","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.3233\/JIFS-223511_ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.219"},{"key":"10.3233\/JIFS-223511_ref4","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1016\/j.comnet.2011.01.006","article-title":"Integrity protecting hierarchical concealed data aggregation for wireless sensor networks","volume":"55","author":"Ozdemir Suat","year":"2011","journal-title":"Computer Networks"},{"key":"10.3233\/JIFS-223511_ref5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.inffus.2011.03.002","volume-title":"Information Fusion","author":"Viejo Alexandre","year":"2012"},{"key":"10.3233\/JIFS-223511_ref6","doi-asserted-by":"crossref","unstructured":"Rafik Omar , Boudia Merad , Senouci Sidi Mohammed and Fehama Mohammed , A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography, Ad Hoc Networks 32 (2015) 98\u2013113, http:\/\/dx.doi.org\/10.1016\/j.adhoc.2015.01.002.","DOI":"10.1016\/j.adhoc.2015.01.002"},{"key":"10.3233\/JIFS-223511_ref7","doi-asserted-by":"crossref","unstructured":"Parmar Keyur and Jinwala Devesh C. , Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks, Wireless Pers Commun 87 (2016), 971. https:\/\/doi.org\/10.1007\/s11277-015-2633-6.","DOI":"10.1007\/s11277-015-2633-6"},{"key":"10.3233\/JIFS-223511_ref9","doi-asserted-by":"crossref","unstructured":"Vinodha D. and MaryAnita E.A. Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review. Archives of Computational Methods in Engineering (Springer) ISSN 1134-3060, 2018, https:\/\/doi.org\/10.1007\/s1181-018-9267-2","DOI":"10.1007\/s11831-018-9267-2"},{"key":"10.3233\/JIFS-223511_ref10","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer Josep , A Provably Secure Additive and Multiplicative Privacy Homomorphism\u201d, ISC 2002, LNCS 2433, pp. 471\u2013483, 2002. Springer-Verlag Berlin Heidelberg","DOI":"10.1007\/3-540-45811-5_37"},{"key":"10.3233\/JIFS-223511_ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"10.3233\/JIFS-223511_ref12","unstructured":"Barker Elaine , Recommendation for Key Management, Part 1: General, NIST Special Publication 800-57 Part 1, Revision 4, July 2015. Doi: http:\/\/dx.org\/10.6028\/NIST.SP.800-57pt1r4."},{"key":"10.3233\/JIFS-223511_ref13","first-page":"308","article-title":"A New Public Key Cryptosystem as Secure as Factoring","author":"Okamoto","year":"1998","journal-title":"Advances in Cryptology, Proceedings of Eurocrypt \u201998,LNCS 1403"},{"key":"10.3233\/JIFS-223511_ref14","doi-asserted-by":"crossref","unstructured":"\u201cTrapdooring Discrete Logarithms on Elliptic Curves over Rings \u201c, Paillier Pascal, Okamoto T. (Ed.): ASIACRYPT LNCS pp. 573\u2013584, 2000.Springer-Verlag Berlin Heidelberg 2000.","DOI":"10.1007\/3-540-44448-3_44"},{"key":"10.3233\/JIFS-223511_ref16","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1109\/ICC.2006.255111","article-title":"Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks","author":"Mykletun","year":"2006","journal-title":"2006 IEEE International Conference on Communications"},{"issue":"4","key":"10.3233\/JIFS-223511_ref17","first-page":"469","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"CRYPTO"},{"key":"10.3233\/JIFS-223511_ref18","doi-asserted-by":"crossref","unstructured":"Pallier P. , Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Proceedings of Eurocrypt 1999, volume 1592 of LNCS, pages 223\u2013238. Springer-Verlag, May 1999.","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"5","key":"10.3233\/JIFS-223511_ref19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/332833.332838","article-title":"Wireless integrated network sensors","volume":"43","author":"Pottie","year":"2000","journal-title":"Commun. ACM"},{"issue":"2","key":"10.3233\/JIFS-223511_ref20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/79.985679","article-title":"Energy-aware wireless microsensor networks","volume":"19","author":"Raghunathan","year":"2002","journal-title":"IEEE Signal Process. Mag."},{"key":"10.3233\/JIFS-223511_ref21","first-page":"575","article-title":"Impact of network density on data aggregation in wireless sensor networks","author":"Intanagonwiwat","year":"2002","journal-title":"Proceedings of the 22nd International Conference on Distributed Computing Systems"},{"key":"10.3233\/JIFS-223511_ref22","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TNET.2009.2032910","article-title":"Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks","volume":"18","author":"Cam Suat Ozdemir Hasan","year":"2010","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.3233\/JIFS-223511_ref23","doi-asserted-by":"crossref","unstructured":"Zhang Ping , Wang Jianxin , Guo Kehua , Wu Fan and Min Geyong , Multi-functional secure data aggregation schemes for WSNs, Ad Hoc Networks 69 (2018), 86\u201399, https:\/\/doi.org\/10.1016\/j.adhoc.2017.11.004.","DOI":"10.1016\/j.adhoc.2017.11.004"},{"key":"10.3233\/JIFS-223511_ref24","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","article-title":"Aggregate and Verifiably Encrypted Signatures from Bilinear Maps","author":"Boneh","journal-title":"Proc. 22nd International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt) (2003)"},{"key":"10.3233\/JIFS-223511_ref26","doi-asserted-by":"publisher","DOI":"10.1007\/b9764891"},{"key":"10.3233\/JIFS-223511_ref27","doi-asserted-by":"crossref","unstructured":"Pollard J. , Monte Carlo methods for index computation (mod p), Mathematics of Computation Volume 32, 1978.","DOI":"10.2307\/2006496"},{"key":"10.3233\/JIFS-223511_ref30","doi-asserted-by":"publisher","first-page":"15952","DOI":"10.3390\/s150715952","article-title":"Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks","volume":"15","author":"Li Xing","year":"2015","journal-title":"Sensors"},{"key":"10.3233\/JIFS-223511_ref31","doi-asserted-by":"publisher","first-page":"12601","DOI":"10.1109\/ACCESS.2017.2716439","article-title":"A secure privacy-preserving data aggregation scheme based on bilinear elgamal cryptosystem for remote health monitoring systems","volume":"5","author":"Al-Rodhaan Mznah","year":"2017","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-223511_ref32","doi-asserted-by":"crossref","unstructured":"Liu X. , Yu J. , Zhang X. , Zhang Q. and Fu C. , Energy-efficient privacy-preserving data aggregation protocols based on slicing, EURASIP Journal on Wireless Communications and Networking 2020(1) (2020).","DOI":"10.1186\/s13638-020-1643-6"},{"key":"10.3233\/JIFS-223511_ref33","doi-asserted-by":"crossref","unstructured":"Vinodha D. and Anita Mary E.A. , Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS), Wireless Communications and Mobile Computing 2021, (2021) 17, Article ID 8824220, https:\/\/doi.org\/10.1155\/2021\/8824220.","DOI":"10.1155\/2021\/8824220"},{"key":"10.3233\/JIFS-223511_ref34","doi-asserted-by":"crossref","unstructured":"Naghibi M. and Barati H. , SHSDA: secure hybrid structure data aggregation method in wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing 12(2021), 10769\u201310788. https:\/\/doi.org\/10.1007\/s12652-020-02751-z.","DOI":"10.1007\/s12652-020-02751-z"},{"key":"10.3233\/JIFS-223511_ref35","doi-asserted-by":"crossref","unstructured":"Murugeshwari B. , Sabatini Aminta S. Jose Lovelit and Padmapriya S. , Effective Data Aggregation in WSN for Enhanced Security and Data Privacy, SSRG International Journal of Electrical and Electronics Engineering, 9(11) 2022 1\u201310, ISSN: 2348-8379\/ https:\/\/doi.org\/10.14445\/23488379\/IJEEE-V9I11P101","DOI":"10.14445\/23488379\/IJEEE-V9I11P101"},{"issue":"4","key":"10.3233\/JIFS-223511_ref36","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1109\/JIOT.2021.3077866","article-title":"Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs","volume":"9","author":"Peng","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-223511_ref37","doi-asserted-by":"crossref","unstructured":"Mathapati M. , Kumaran T.S. , Prasad K.H.S. et al. Framework with temporal attribute for secure data aggregation in sensor network, SN Appl. Sci. 2 (2022) 1975. https:\/\/doi.org\/10.1007\/s42452-020-03773-0.","DOI":"10.1007\/s42452-020-03773-0"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-223511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:58:32Z","timestamp":1769673512000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-223511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-223511","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,2]]}}}