International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 12, Issue 12 (December 2025), Pages: 253-265

----------------------------------------------

 Original Research Paper

Secure WSN-IoT using end-to-end elliptic curve and homomorphic encryption

 Author(s): 

 Mohammad Ibrahim Adawy *

 Affiliation(s):

 Department of Data Systems and Networks, Faculty of Information Technology, World Islamic Sciences and Education University, Amman, Jordan

 Full text

    Full Text - PDF

 * Corresponding Author. 

   Corresponding author's ORCID profile:  https://orcid.org/0009-0006-7983-3110

 Digital Object Identifier (DOI)

  https://doi.org/10.21833/ijaas.2025.12.023

 Abstract

The security of the Internet of Things (IoT) has become a major research concern, particularly in the perception layer where wireless sensor networks (WSNs) operate and generate large amounts of data. Without encryption, transmitted data in WSN-IoT networks is vulnerable to security attacks. Conventional methods that decrypt, aggregate, and re-encrypt data consume excessive energy at the aggregator and increase end-to-end delay. To address these issues, this study proposes a secure data aggregation scheme based on end-to-end elliptic curve and homomorphic encryption (EEECHE). The scheme ensures data confidentiality from nodes to the server while minimizing energy consumption and latency. It also applies a message authentication code (MAC) to verify data authenticity and detect false data efficiently. Experimental results show that the proposed scheme achieves stronger security with lower energy usage and end-to-end delay compared to cluster-based semi-homomorphic encryption aggregated data (CSHEAD) and cluster-based secure data aggregation (CSDA).

 © 2025 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords

 Internet of Things, Wireless sensor networks, Data aggregation, Homomorphic encryption, Message authentication

 Article history

 Received 8 June 2025, Received in revised form 1 October 2025, Accepted 4 December 2025

 Funding

The research fees are covered by WISE University. 

 Acknowledgment

No Acknowledgment. 

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Adawy MI (2025). Secure WSN-IoT using end-to-end elliptic curve and homomorphic encryption. International Journal of Advanced and Applied Sciences, 12(12): 253-265

  Permanent Link to this page

 Figures

  Fig. 1  Fig. 2  Fig. 3  Fig. 4  Fig. 5  Fig. 6  Fig. 7  Fig. 8  Fig. 9  Fig. 10  Fig. 11 

 Tables

  Table 1  Table 2 

----------------------------------------------   

 References (24)

  1. Adawy MI, Awang Nor S, and Mahmuddin M (2018). Data redundancy reduction in wireless sensor network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-11): 1–6.    [Google Scholar]
  2. Adawy MI, Tahboush M, Aloqaily O, and Abdulraheem W (2023). Man-in-the-middle attack detection scheme on data aggregation in wireless sensor networks. International Journal of Advances in Soft Computing and its Applications, 15(2): 179–193.    [Google Scholar]
  3. Al-Baz A and El-Sayed A (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems, 31(1): e3407.  https://doi.org/10.1002/dac.3407    [Google Scholar]
  4. Bajpai A and Yadav A (2024). A novel approach for secure data aggregation scheme in battlefield surveillance using elliptic curve cryptography. In: Roy BK, Chaturvedi A, Tsaban B, and Hasan SU (Eds.), Cryptology and network security with machine learning. ICCNSML 2022. Algorithms for intelligent systems: 265–277. Springer, Singapore, Singapore.  https://doi.org/10.1007/978-981-99-2229-1_23    [Google Scholar]
  5. Elhoseny M, Elminir H, Riad A, and Yuan X (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University - Computer and Information Sciences, 28(3): 262–275.  https://doi.org/10.1016/j.jksuci.2015.11.001    [Google Scholar]
  6. Fang W, Wen XZ, Xu J, and Zhu JZ (2019). CSDA: A novel cluster-based secure data aggregation scheme for WSNs. Cluster Computing, 22(Suppl 3): 5233–5244.  https://doi.org/10.1007/s10586-017-1195-7    [Google Scholar]
  7. Gentry C and Halevi S (2011). Implementing Gentry’s fully-homomorphic encryption scheme. In: Paterson KG (Ed.), Advances in cryptology – EUROCRYPT 2011. Lecture notes in computer science, 6632: 129-148. Springer, Berlin, Germany.  https://doi.org/10.1007/978-3-642-20465-4_9    [Google Scholar]
  8. Gulati K, Boddu RS, Kapila D, Bangare SL, Chandnani N, and Saravanan G (2022). A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 51(Part 1): 161-165.  https://doi.org/10.1016/j.matpr.2021.05.067    [Google Scholar]
  9. Hong MQ, Wang PY, and Zhao WB (2016). Homomorphic encryption scheme based on elliptic curve cryptography for privacy protection of cloud computing. In the IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), IEEE, New York, USA: 152-157.  https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.51    [Google Scholar]
  10. Huang Y, Wang L, Hou Y, Zhang W, and Zhang Y (2018). A prototype IOT based wireless sensor network for traffic information monitoring. International Journal of Pavement Research and Technology, 11(2): 146-152.  https://doi.org/10.1016/j.ijprt.2017.07.005    [Google Scholar]
  11. Ifzarne S, Hafidi I, and Idrissi N (2021). A novel secure data aggregation scheme based on semihomomorphic encryption in WSNs. Journal of Communications, 16(8): 323–330.  https://doi.org/10.12720/jcm.16.8.323-330    [Google Scholar]
  12. Kumar M, Sethi M, Rani S, Sah DK, AlQahtani SA, and Al-Rakhami MS (2023). Secure data aggregation based on end-to-end homomorphic encryption in IoT-based wireless sensor networks. Sensors, 23(13): 6181.  https://doi.org/10.3390/s23136181    [Google Scholar] PMid:37448038 PMCid:PMC10346161
  13. Kumar M, Verma S, and Lata K (2015). Secure data aggregation in wireless sensor networks using homomorphic encryption. International Journal of Electronics, 102(4): 690–702.  https://doi.org/10.1080/00207217.2014.936524    [Google Scholar]
  14. Lavanya G, Velammal BL, and Kulothungan K (2022). SCDAP–Secured cluster based data aggregation protocol for energy efficient communication in wireless sensor networks. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 44(3): 4747-4757.  https://doi.org/10.3233/JIFS-223256    [Google Scholar]
  15. Li X, Chen D, Li C, and Wang L (2015). Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors, 15(7): 15952–15973.  https://doi.org/10.3390/s150715952    [Google Scholar] PMid:26151208 PMCid:PMC4541862
  16. Mocanu DC, Vega MT, and Liotta A (2015). Redundancy reduction in wireless sensor networks via centrality metrics. In the IEEE International Conference on Data Mining Workshop (ICDMW), IEEE, Atlantic City, USA: 501-507.  https://doi.org/10.1109/ICDMW.2015.53    [Google Scholar]
  17. Pu Y, Luo J, Hu C, Yu J, Zhao R, Huang H, and Xiang T (2019). Two secure privacy-preserving data aggregation schemes for IoT. Wireless Communications and Mobile Computing, 2019: 3985232.  https://doi.org/10.1155/2019/3985232    [Google Scholar]
  18. Qu Z and Li B (2022). An energy-efficient clustering method for target tracking based on tracking anchors in wireless sensor networks. Sensors, 22(15): 5675.  https://doi.org/10.3390/s22155675    [Google Scholar] PMid:35957232 PMCid:PMC9371144
  19. Randhawa S and Jain S (2017). Data aggregation in wireless sensor networks: Previous research, current status and future directions. Wireless Personal Communications, 97: 3355–3425.  https://doi.org/10.1007/s11277-017-4674-5    [Google Scholar]
  20. Siddiqui S, Khan AA, and Ghani S (2015). A survey on data aggregation mechanisms in wireless sensor networks. In the International Conference on Information and Communication Technologies (ICICT), IEEE, Karachi, Pakistan: 1-7.  https://doi.org/10.1109/ICICT.2015.7469596    [Google Scholar]
  21. Szczechowiak P and Collier M (2009). TinyIBE: Identity-based encryption for heterogeneous sensor networks. In the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Melbourne, Australia: 319-354.  https://doi.org/10.1109/ISSNIP.2009.5416743    [Google Scholar]
  22. Ugus O, Westhoff D, Laue R, Shoufan A, and Huss SA (2009). Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. Arxiv Preprint Arxiv:0903.3900.  https://doi.org/10.48550/arXiv.0903.3900    [Google Scholar]
  23. Zhou Q, Yang G, and He L (2014). A secure-enhanced data aggregation based on ECC in wireless sensor networks. Sensors, 14(4): 6701–6721.  https://doi.org/10.3390/s140406701    [Google Scholar] PMid:24732099 PMCid:PMC4029653
  24. Zijie F, Al-Shareeda MA, Saare MA, Manickam S, and Karuppayah S (2023). Wireless sensor networks in the Internet of Things: Review, techniques, challenges, and future directions. Indonesian Journal of Electrical Engineering and Computer Science, 31(2): 1190–1200.  https://doi.org/10.11591/ijeecs.v31.i2.pp1190-1200    [Google Scholar]