{"id":"https://openalex.org/W7117456140","doi":"https://doi.org/10.1109/ipccc66453.2025.11304627","title":"Secure and Privacy-Preserving Data Aggregation Against Malicious Gateway in RPL-Based Internet of Things","display_name":"Secure and Privacy-Preserving Data Aggregation Against Malicious Gateway in RPL-Based Internet of Things","publication_year":2025,"publication_date":"2025-11-15","ids":{"openalex":"https://openalex.org/W7117456140","doi":"https://doi.org/10.1109/ipccc66453.2025.11304627"},"language":null,"primary_location":{"id":"doi:10.1109/ipccc66453.2025.11304627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc66453.2025.11304627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093961721","display_name":"Image Bhattarai","orcid":"https://orcid.org/0009-0003-1466-6460"},"institutions":[{"id":"https://openalex.org/I4210131712","display_name":"Oklahoma State University Oklahoma City","ror":"https://ror.org/03y1zyv86","country_code":"US","type":"education","lineage":["https://openalex.org/I4210131712"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Image Bhattarai","raw_affiliation_strings":["Oklahoma State University,Department of Computer Science,United States"],"affiliations":[{"raw_affiliation_string":"Oklahoma State University,Department of Computer Science,United States","institution_ids":["https://openalex.org/I4210131712"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055425939","display_name":"Cong Pu","orcid":"https://orcid.org/0009-0004-5464-3869"},"institutions":[{"id":"https://openalex.org/I4210131712","display_name":"Oklahoma State University Oklahoma City","ror":"https://ror.org/03y1zyv86","country_code":"US","type":"education","lineage":["https://openalex.org/I4210131712"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cong Pu","raw_affiliation_strings":["Oklahoma State University,Department of Computer Science,United States"],"affiliations":[{"raw_affiliation_string":"Oklahoma State University,Department of Computer Science,United States","institution_ids":["https://openalex.org/I4210131712"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093961721"],"corresponding_institution_ids":["https://openalex.org/I4210131712"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67872309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.29600000381469727,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.29600000381469727,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.14190000295639038,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.06459999829530716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5343999862670898},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.48350000381469727},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.46459999680519104},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4584999978542328},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.43479999899864197},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.39750000834465027},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.3971000015735626},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.39250001311302185},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.39100000262260437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7580000162124634},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6126000285148621},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5343999862670898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5149999856948853},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.48350000381469727},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.46459999680519104},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4584999978542328},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.43479999899864197},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.39750000834465027},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3971000015735626},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.39250001311302185},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.39100000262260437},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3887999951839447},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3849000036716461},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.38109999895095825},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3328000009059906},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3255999982357025},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.302700012922287},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C136923852","wikidata":"https://www.wikidata.org/wiki/Q1509823","display_name":"H.248","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C52837422","wikidata":"https://www.wikidata.org/wiki/Q431028","display_name":"Interior gateway protocol","level":5,"score":0.27000001072883606},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc66453.2025.11304627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc66453.2025.11304627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2117064875","https://openalex.org/W2325877089","https://openalex.org/W2770070197","https://openalex.org/W2904756156","https://openalex.org/W2950017470","https://openalex.org/W3005367885","https://openalex.org/W3009109352","https://openalex.org/W3011501289","https://openalex.org/W3036075578","https://openalex.org/W3173935236","https://openalex.org/W3213553527","https://openalex.org/W4210519086","https://openalex.org/W4285259038","https://openalex.org/W4308477817","https://openalex.org/W4309355548","https://openalex.org/W4310720487","https://openalex.org/W4313368300","https://openalex.org/W4317797484","https://openalex.org/W4362716538","https://openalex.org/W4365509262","https://openalex.org/W4390905644","https://openalex.org/W4391164331","https://openalex.org/W4391310790","https://openalex.org/W4391877019","https://openalex.org/W4394586071","https://openalex.org/W4400770731","https://openalex.org/W4400966593","https://openalex.org/W4405909192","https://openalex.org/W4406321273","https://openalex.org/W4406755220","https://openalex.org/W4406856648","https://openalex.org/W4409811638","https://openalex.org/W4409818081"],"related_works":[],"abstract_inverted_index":{"In":[0,34,55,81,128],"the":[1,7,13,31,56,60,71,83,91,103,148,169,175,185,192,214,227],"era":[2],"of":[3,9,15,58,93,105,122,217,229,260],"Industry":[4],"4.0":[5],"(4IR),":[6],"Internet":[8],"Things":[10],"(IoT)":[11],"drives":[12],"transformation":[14],"conventional":[16],"operation":[17],"mode":[18],"into":[19],"intelligent":[20],"systems":[21,117],"through":[22],"interconnecting":[23],"smart":[24],"devices":[25,52,76,144,190],"to":[26,36,90,118,173,210,225],"monitor,":[27],"analyze,":[28],"and":[29,53,70,95,108,125,135,145,161,164,195,212,262,270],"optimize":[30],"target":[32],"applications.":[33],"order":[35],"achieve":[37],"energy-saving":[38],"data":[39,72,106,137,187,193],"transmission,":[40],"a":[41,111,133],"routing":[42,150,171],"protocol,":[43],"called":[44,140],"RPL,":[45],"has":[46],"been":[47],"specified":[48],"for":[49,67,114,142],"resource-challenged":[50],"IoT":[51,61,75,84,116,143,177,189,246],"networks.":[54],"context":[57],"4IR,":[59],"technology":[62],"is":[63,153,165],"being":[64],"widely":[65,206],"used":[66],"mission-critical":[68],"systems,":[69],"collected":[73],"by":[74,231],"might":[77],"contain":[78],"privacy-sensitive":[79],"information.":[80],"addition,":[82],"gateway":[85,178,250],"could":[86],"be":[87],"compromised":[88],"due":[89],"lack":[92],"necessary":[94],"persistent":[96],"physical":[97,156],"and/or":[98],"logical":[99],"security":[100,107,202,215,269],"protection.":[101],"Hence,":[102],"protection":[104],"privacy":[109,271],"becomes":[110],"crucial":[112],"factor":[113],"RPL-based":[115],"realize":[119],"their":[120],"quality":[121],"service":[123],"requirements":[124],"objectives":[126],"successfully.":[127],"this":[129],"paper,":[130],"we":[131],"propose":[132],"secure":[134],"privacy-preserving":[136],"aggregation":[138],"approach,":[139],"SPARDA,":[141],"networks":[146,247],"running":[147],"RPL":[149,170],"protocol.":[151],"SPARDA":[152,230,244],"realized":[154],"with":[155,168,233],"unclonable":[157],"function,":[158,163],"homomorphic":[159],"encryption,":[160],"trapdoor":[162],"perfectly":[166],"integrated":[167],"protocol":[172,203],"prevent":[174],"malicious":[176,249],"from":[179,188,248],"either":[180],"accessing,":[181],"falsificating,":[182],"or":[183],"corrupting":[184],"real-time":[186],"throughout":[191],"gathering":[194],"summarization":[196],"phase.":[197],"We":[198,219],"choose":[199],"an":[200,222],"automatic":[201],"verification":[204],"tool,":[205],"known":[207],"as":[208],"AVISPA,":[209],"analyze":[211],"verify":[213],"specification":[216],"SPARDA.":[218],"also":[220,254],"conduct":[221],"experimental":[223,237],"study":[224],"evaluate":[226],"performance":[228],"comparing":[232],"benchmark":[234],"methods.":[235],"The":[236],"results":[238],"indicate":[239],"that":[240],"not":[241],"only":[242],"does":[243],"protect":[245],"attacks,":[251],"but":[252],"it":[253],"outperforms":[255],"existing":[256],"schemes":[257],"in":[258],"terms":[259],"computation":[261],"storage":[263],"overheads":[264],"while":[265],"satisfying":[266],"all":[267],"critical":[268],"criteria.":[272]},"counts_by_year":[],"updated_date":"2025-12-30T23:08:21.542490","created_date":"2025-12-29T00:00:00"}
