|
Volume 12, Issue 12 (December 2025), Pages: 253-265
----------------------------------------------
Original Research Paper
Secure WSN-IoT using end-to-end elliptic curve and homomorphic encryption
Author(s):
Mohammad Ibrahim Adawy *
Affiliation(s):
Department of Data Systems and Networks, Faculty of Information Technology, World Islamic Sciences and Education University, Amman, Jordan
Full text
Full Text - PDF
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0009-0006-7983-3110
Digital Object Identifier (DOI)
https://doi.org/10.21833/ijaas.2025.12.023
Abstract
The security of the Internet of Things (IoT) has become a major research concern, particularly in the perception layer where wireless sensor networks (WSNs) operate and generate large amounts of data. Without encryption, transmitted data in WSN-IoT networks is vulnerable to security attacks. Conventional methods that decrypt, aggregate, and re-encrypt data consume excessive energy at the aggregator and increase end-to-end delay. To address these issues, this study proposes a secure data aggregation scheme based on end-to-end elliptic curve and homomorphic encryption (EEECHE). The scheme ensures data confidentiality from nodes to the server while minimizing energy consumption and latency. It also applies a message authentication code (MAC) to verify data authenticity and detect false data efficiently. Experimental results show that the proposed scheme achieves stronger security with lower energy usage and end-to-end delay compared to cluster-based semi-homomorphic encryption aggregated data (CSHEAD) and cluster-based secure data aggregation (CSDA).
© 2025 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords
Internet of Things, Wireless sensor networks, Data aggregation, Homomorphic encryption, Message authentication
Article history
Received 8 June 2025, Received in revised form 1 October 2025, Accepted 4 December 2025
Funding
The research fees are covered by WISE University.
Acknowledgment
No Acknowledgment.
Compliance with ethical standards
Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Citation:
Adawy MI (2025). Secure WSN-IoT using end-to-end elliptic curve and homomorphic encryption. International Journal of Advanced and Applied Sciences, 12(12): 253-265
Permanent Link to this page
Figures
Fig. 1 Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Tables
Table 1 Table 2
----------------------------------------------
References (24)
- Adawy MI, Awang Nor S, and Mahmuddin M (2018). Data redundancy reduction in wireless sensor network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-11): 1–6.
[Google Scholar]
- Adawy MI, Tahboush M, Aloqaily O, and Abdulraheem W (2023). Man-in-the-middle attack detection scheme on data aggregation in wireless sensor networks. International Journal of Advances in Soft Computing and its Applications, 15(2): 179–193.
[Google Scholar]
- Al-Baz A and El-Sayed A (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems, 31(1): e3407. https://doi.org/10.1002/dac.3407
[Google Scholar]
- Bajpai A and Yadav A (2024). A novel approach for secure data aggregation scheme in battlefield surveillance using elliptic curve cryptography. In: Roy BK, Chaturvedi A, Tsaban B, and Hasan SU (Eds.), Cryptology and network security with machine learning. ICCNSML 2022. Algorithms for intelligent systems: 265–277. Springer, Singapore, Singapore. https://doi.org/10.1007/978-981-99-2229-1_23
[Google Scholar]
- Elhoseny M, Elminir H, Riad A, and Yuan X (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University - Computer and Information Sciences, 28(3): 262–275. https://doi.org/10.1016/j.jksuci.2015.11.001
[Google Scholar]
- Fang W, Wen XZ, Xu J, and Zhu JZ (2019). CSDA: A novel cluster-based secure data aggregation scheme for WSNs. Cluster Computing, 22(Suppl 3): 5233–5244. https://doi.org/10.1007/s10586-017-1195-7
[Google Scholar]
- Gentry C and Halevi S (2011). Implementing Gentry’s fully-homomorphic encryption scheme. In: Paterson KG (Ed.), Advances in cryptology – EUROCRYPT 2011. Lecture notes in computer science, 6632: 129-148. Springer, Berlin, Germany. https://doi.org/10.1007/978-3-642-20465-4_9
[Google Scholar]
- Gulati K, Boddu RS, Kapila D, Bangare SL, Chandnani N, and Saravanan G (2022). A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 51(Part 1): 161-165. https://doi.org/10.1016/j.matpr.2021.05.067
[Google Scholar]
- Hong MQ, Wang PY, and Zhao WB (2016). Homomorphic encryption scheme based on elliptic curve cryptography for privacy protection of cloud computing. In the IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), IEEE, New York, USA: 152-157. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.51
[Google Scholar]
- Huang Y, Wang L, Hou Y, Zhang W, and Zhang Y (2018). A prototype IOT based wireless sensor network for traffic information monitoring. International Journal of Pavement Research and Technology, 11(2): 146-152. https://doi.org/10.1016/j.ijprt.2017.07.005
[Google Scholar]
- Ifzarne S, Hafidi I, and Idrissi N (2021). A novel secure data aggregation scheme based on semihomomorphic encryption in WSNs. Journal of Communications, 16(8): 323–330. https://doi.org/10.12720/jcm.16.8.323-330
[Google Scholar]
- Kumar M, Sethi M, Rani S, Sah DK, AlQahtani SA, and Al-Rakhami MS (2023). Secure data aggregation based on end-to-end homomorphic encryption in IoT-based wireless sensor networks. Sensors, 23(13): 6181. https://doi.org/10.3390/s23136181
[Google Scholar]
PMid:37448038 PMCid:PMC10346161
- Kumar M, Verma S, and Lata K (2015). Secure data aggregation in wireless sensor networks using homomorphic encryption. International Journal of Electronics, 102(4): 690–702. https://doi.org/10.1080/00207217.2014.936524
[Google Scholar]
- Lavanya G, Velammal BL, and Kulothungan K (2022). SCDAP–Secured cluster based data aggregation protocol for energy efficient communication in wireless sensor networks. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 44(3): 4747-4757. https://doi.org/10.3233/JIFS-223256
[Google Scholar]
- Li X, Chen D, Li C, and Wang L (2015). Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors, 15(7): 15952–15973. https://doi.org/10.3390/s150715952
[Google Scholar]
PMid:26151208 PMCid:PMC4541862
- Mocanu DC, Vega MT, and Liotta A (2015). Redundancy reduction in wireless sensor networks via centrality metrics. In the IEEE International Conference on Data Mining Workshop (ICDMW), IEEE, Atlantic City, USA: 501-507. https://doi.org/10.1109/ICDMW.2015.53
[Google Scholar]
- Pu Y, Luo J, Hu C, Yu J, Zhao R, Huang H, and Xiang T (2019). Two secure privacy-preserving data aggregation schemes for IoT. Wireless Communications and Mobile Computing, 2019: 3985232. https://doi.org/10.1155/2019/3985232
[Google Scholar]
- Qu Z and Li B (2022). An energy-efficient clustering method for target tracking based on tracking anchors in wireless sensor networks. Sensors, 22(15): 5675. https://doi.org/10.3390/s22155675
[Google Scholar]
PMid:35957232 PMCid:PMC9371144
- Randhawa S and Jain S (2017). Data aggregation in wireless sensor networks: Previous research, current status and future directions. Wireless Personal Communications, 97: 3355–3425. https://doi.org/10.1007/s11277-017-4674-5
[Google Scholar]
- Siddiqui S, Khan AA, and Ghani S (2015). A survey on data aggregation mechanisms in wireless sensor networks. In the International Conference on Information and Communication Technologies (ICICT), IEEE, Karachi, Pakistan: 1-7. https://doi.org/10.1109/ICICT.2015.7469596
[Google Scholar]
- Szczechowiak P and Collier M (2009). TinyIBE: Identity-based encryption for heterogeneous sensor networks. In the International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Melbourne, Australia: 319-354. https://doi.org/10.1109/ISSNIP.2009.5416743
[Google Scholar]
- Ugus O, Westhoff D, Laue R, Shoufan A, and Huss SA (2009). Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. Arxiv Preprint Arxiv:0903.3900. https://doi.org/10.48550/arXiv.0903.3900
[Google Scholar]
- Zhou Q, Yang G, and He L (2014). A secure-enhanced data aggregation based on ECC in wireless sensor networks. Sensors, 14(4): 6701–6721. https://doi.org/10.3390/s140406701
[Google Scholar]
PMid:24732099 PMCid:PMC4029653
- Zijie F, Al-Shareeda MA, Saare MA, Manickam S, and Karuppayah S (2023). Wireless sensor networks in the Internet of Things: Review, techniques, challenges, and future directions. Indonesian Journal of Electrical Engineering and Computer Science, 31(2): 1190–1200. https://doi.org/10.11591/ijeecs.v31.i2.pp1190-1200
[Google Scholar]
|