{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:25:28Z","timestamp":1775067928017,"version":"3.50.1"},"reference-count":31,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>By definition, the aggregating methodology ensures that transmitted data remain visible in clear text in the aggregated units or nodes. Data transmission without encryption is vulnerable to security issues such as data confidentiality, integrity, authentication and attacks by adversaries. On the other hand, encryption at each hop requires extra computation for decrypting, aggregating, and then re-encrypting the data, which results in increased complexity, not only in terms of computation but also due to the required sharing of keys. Sharing the same key across various nodes makes the security more vulnerable. An alternative solution to secure the aggregation process is to provide an end-to-end security protocol, wherein intermediary nodes combine the data without decoding the acquired data. As a consequence, the intermediary aggregating nodes do not have to maintain confidential key values, enabling end-to-end security across sensor devices and base stations. This research presents End-to-End Homomorphic Encryption (EEHE)-based safe and secure data gathering in IoT-based Wireless Sensor Networks (WSNs), whereby it protects end-to-end security and enables the use of aggregator functions such as COUNT, SUM and AVERAGE upon encrypted messages. Such an approach could also employ message authentication codes (MAC) to validate data integrity throughout data aggregation and transmission activities, allowing fraudulent content to also be identified as soon as feasible. Additionally, if data are communicated across a WSN, then there is a higher likelihood of a wormhole attack within the data aggregation process. The proposed solution also ensures the early detection of wormhole attacks during data aggregation.<\/jats:p>","DOI":"10.3390\/s23136181","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T01:57:09Z","timestamp":1688695029000},"page":"6181","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks"],"prefix":"10.3390","volume":"23","author":[{"given":"Mukesh","family":"Kumar","sequence":"first","affiliation":[{"name":"Panipat Institute of Engineering and Technology, Panipat 132103, Haryana, India"}]},{"given":"Monika","family":"Sethi","sequence":"additional","affiliation":[{"name":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8474-9435","authenticated-orcid":false,"given":"Shalli","family":"Rani","sequence":"additional","affiliation":[{"name":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India"}]},{"given":"Dipak Kumar","family":"Sah","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Applications, GLA University, Mathura 281406, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1233-1774","authenticated-orcid":false,"given":"Salman A.","family":"AlQahtani","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5343-8370","authenticated-orcid":false,"given":"Mabrook S.","family":"Al-Rakhami","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2023,7,6]]},"reference":[{"key":"ref_1","first-page":"2393","article-title":"Security for Wireless Sensor Network","volume":"3","author":"Singh","year":"2011","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MWC.2007.358967","article-title":"In-Network Aggregation Techniques for Wireless Sensor Networks: A Survey","volume":"14","author":"Fasolo","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Znaidi, W., Minier, M., and Babau, J.P. (2008, January 15\u201318). Detecting wormhole attacks in wireless networks using local neighborhood information. Proceedings of the IEEE Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France.","DOI":"10.1109\/PIMRC.2008.4699583"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1007\/s11277-014-2061-z","article-title":"Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption","volume":"80","author":"Othman","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_5","unstructured":"Sen, J. (2010). Theory and Practice of Cryptography and Network Security Protocols and Technologies, Intech Publishers."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sun, H., Lin, Y., Hsiao, Y., and Chen, C. (2008, January 29\u201331). An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. Proceedings of the ICESS08, Chengdu, China.","DOI":"10.1109\/ICESS.2008.9"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TMC.2006.144","article-title":"Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption key distribution and routing adaptation","volume":"5","author":"Westhoff","year":"2006","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"2","author":"Perrig","year":"2002","journal-title":"Wirel. Netw. J."},{"key":"ref_9","first-page":"3089","article-title":"Wireless Sensor Network (WSN) architectural design issues and challenges (IJCSE)","volume":"2","author":"Jangra","year":"2010","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","article-title":"Secure data aggregation in wireless sensor networks: A comprehensive overview","volume":"53","author":"Ozdemir","year":"2009","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TNET.2009.2032910","article-title":"Integration of False data detection with data aggregation and confidential transmission in WSN","volume":"18","author":"Ozdemir","year":"2010","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1016\/j.comnet.2011.01.006","article-title":"Integrity protecting hierarchical concealed data aggregation for wireless sensor networks","volume":"55","author":"Ozdemir","year":"2011","journal-title":"Comput. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1016\/j.comcom.2010.02.026","article-title":"Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks","volume":"34","author":"Li","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6701","DOI":"10.3390\/s140406701","article-title":"A secure-enhanced data aggregation based on ECC in wireless sensor networks","volume":"14","author":"Zhou","year":"2014","journal-title":"Sensors"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"15952","DOI":"10.3390\/s150715952","article-title":"Secure Data Aggregation with Fully Homo-morphic Encryption in Large-Scale Wireless Sensor Networks","volume":"15","author":"Li","year":"2015","journal-title":"Sensors"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Tan, H., Ostry, D., Zic, J., and Jha, S. (2009, January 16\u201319). A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Proceedings of the Second ACM Conference on Wireless Network Security, Zurich, Switzerland.","DOI":"10.1145\/1514274.1514308"},{"key":"ref_17","unstructured":"Jacques, M.B., Guyeux, C., and Makhoul, A. (2010, January 18\u201325). Efficient and robust secure aggregation of encrypted data in sensor networks. Proceedings of the Fourth International Conference on Sensor Technologies and Applications, Venice, Italy."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.compeleceng.2011.11.017","article-title":"A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks","volume":"38","author":"Wang","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"ref_19","unstructured":"Goluch, S. (1999). The Development of Homomorphic Cryptography. [Ph.D. Thesis, Institute of Discrete Mathematics and Geometry, Vienna University of Technology]."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1111\/j.1939-165X.2006.tb00082.x","article-title":"Receiver-operating characteristic curves and likelihood ratios: Improvements over traditional methods for the evaluation and application of veterinary clinical pathology tests","volume":"35","author":"Gardner","year":"2006","journal-title":"Vet. Clin. Pathol."},{"key":"ref_21","first-page":"5145","article-title":"WSN Protocols, Research challenges in WSN, Integrated areas of sensor networks, security attacks in WSN","volume":"7","author":"Saini","year":"2020","journal-title":"Eur. J. Mol. Clin. Med."},{"key":"ref_22","unstructured":"Kumar, M., Gupta, O., and Rani, S. (2021). Energy-Efficient Underwater Wireless Communications and Networking, IGI Global."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sharma, A., Das, P., and Patel, R.B. (2021, January 7\u20139). A Comprehensive Review on Clustering in WSN: Optimization Techniques and Future Research Challenges. Proceedings of the 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India.","DOI":"10.1109\/ISPCC53510.2021.9609420"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Goyal, N., and Nain, M. (2021, January 3\u20134). Node Localization techniques analysis in challenging underwater wireless sensor network. Proceedings of the 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India.","DOI":"10.1109\/ICRITO51393.2021.9596251"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2365","DOI":"10.1007\/s11036-021-01833-2","article-title":"TORM: Tunicate swarm algorithm-based optimized routing mechanism in IoT-based framework","volume":"26","author":"Dogra","year":"2021","journal-title":"Mob. Netw. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s11276-019-02170-9","article-title":"A hybrid approach for the optimization of quality of service metrics of WSN","volume":"26","author":"Rani","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e6942","DOI":"10.1002\/cpe.6942","article-title":"Dynamic topology control algorithm for node deployment in mobile underwater wireless sensor networks","volume":"34","author":"Choudhary","year":"2022","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_28","unstructured":"Guleria, K., Atham, S.B., and Kumar, A. (2021). Energy-Efficient Underwater Wireless Communications and Networking, IGI Global."},{"key":"ref_29","first-page":"1","article-title":"Performance Optimization of Multi-Hop Routing Protocols with Clustering-Based Hybrid Network-ing Architecture in Mobile Adhoc Cloud Networks","volume":"12","author":"Srivastava","year":"2022","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"107473","DOI":"10.1016\/j.asoc.2021.107473","article-title":"An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities","volume":"108","author":"Dowlatshahi","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/JBHI.2021.3128775","article-title":"Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns","volume":"27","author":"Xu","year":"2021","journal-title":"IEEE J. Biomed. Health Inform."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/13\/6181\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:07:14Z","timestamp":1760126834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/13\/6181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":31,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["s23136181"],"URL":"https:\/\/doi.org\/10.3390\/s23136181","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,6]]}}}