{"id":"https://openalex.org/W4387757827","doi":"https://doi.org/10.1109/tii.2023.3315375","title":"A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT","display_name":"A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT","publication_year":2023,"publication_date":"2023-10-18","ids":{"openalex":"https://openalex.org/W4387757827","doi":"https://doi.org/10.1109/tii.2023.3315375"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2023.3315375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3315375","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019453469","display_name":"Shuai Shang","orcid":"https://orcid.org/0000-0002-5107-7070"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuai Shang","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Key Laboratory of Data Protection and Intelligent Management, Ministry of Education, Sichuan University, Chengdu, China","Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Key Laboratory of Data Protection and Intelligent Management, Ministry of Education, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077448011","display_name":"Ke Gu","orcid":"https://orcid.org/0000-0002-0793-5218"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Gu","raw_affiliation_strings":["School of Computer &amp; Communication Engineering, Changsha University of Science &amp; Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer &amp; Communication Engineering, Changsha University of Science &amp; Technology, Changsha, China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100440392","display_name":"Lei Li","orcid":"https://orcid.org/0000-0003-1753-8766"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Li","raw_affiliation_strings":["School of Mechano-Electronic Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Mechano-Electronic Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vijayakumar Pandi","raw_affiliation_strings":["Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019453469"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":4.3491,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95533084,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"20","issue":"3","first_page":"4305","last_page":"4316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7910420894622803},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7827239036560059},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6134468913078308},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5811668038368225},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.555109977722168},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5141551494598389},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5004253387451172},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4917581379413605},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.48988550901412964},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.47471559047698975},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46322324872016907},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4525737464427948},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.45183759927749634},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4331912398338318},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42250093817710876},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39219361543655396},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.35896313190460205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3290429711341858},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24473634362220764},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.2440301775932312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24175536632537842},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.19248893857002258},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07795590162277222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7910420894622803},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7827239036560059},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6134468913078308},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5811668038368225},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.555109977722168},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5141551494598389},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5004253387451172},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4917581379413605},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.48988550901412964},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.47471559047698975},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46322324872016907},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4525737464427948},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.45183759927749634},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4331912398338318},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42250093817710876},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39219361543655396},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.35896313190460205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3290429711341858},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24473634362220764},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2440301775932312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24175536632537842},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.19248893857002258},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07795590162277222},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2023.3315375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2023.3315375","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1525844701","display_name":null,"funder_award_id":"62072078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3431386612","display_name":null,"funder_award_id":"62332018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G45930046","display_name":null,"funder_award_id":"62271128","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W2052747341","https://openalex.org/W2105103777","https://openalex.org/W2114296561","https://openalex.org/W2132172731","https://openalex.org/W2337072530","https://openalex.org/W2416799949","https://openalex.org/W2575938897","https://openalex.org/W2751163291","https://openalex.org/W2809629291","https://openalex.org/W2900595267","https://openalex.org/W2914573678","https://openalex.org/W2948140566","https://openalex.org/W2950752059","https://openalex.org/W2956179481","https://openalex.org/W2993170066","https://openalex.org/W2997823310","https://openalex.org/W3000492549","https://openalex.org/W3004549544","https://openalex.org/W3048383079","https://openalex.org/W3120374063","https://openalex.org/W3121113880","https://openalex.org/W3155748624","https://openalex.org/W3156724004","https://openalex.org/W3185504100","https://openalex.org/W3201624531","https://openalex.org/W3207929292","https://openalex.org/W3209358401","https://openalex.org/W3209583012","https://openalex.org/W4323059284","https://openalex.org/W6755953411"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W2782833818","https://openalex.org/W1990743860","https://openalex.org/W4226182343","https://openalex.org/W3191743943","https://openalex.org/W4303856864","https://openalex.org/W2260005205","https://openalex.org/W3213981908","https://openalex.org/W2332531239"],"abstract_inverted_index":{"Edge-supported":[0],"Industrial":[1],"Internet":[2],"of":[3,26,105,116,138,172,195],"Things":[4],"(IIoT)":[5],"has":[6],"received":[7],"remarkable":[8],"attention":[9],"recently":[10],"since":[11],"edge":[12,202],"computing":[13],"can":[14],"not":[15,65,133],"only":[16,134],"reduce":[17],"bandwidth":[18],"consumption":[19],"but":[20,146],"also":[21,147],"decrease":[22],"the":[23,30,34,41,48,79,95,98,103,130,136,139,161,173,183,189],"response":[24],"time":[25],"industrial":[27,35],"systems.":[28],"However,":[29],"sensed":[31],"data":[32,42,88,140],"in":[33,200],"environment":[36],"is":[37],"considered":[38],"private.":[39],"Thus,":[40],"cannot":[43],"be":[44],"directly":[45],"aggregated":[46],"at":[47,77],"server":[49],"due":[50],"to":[51,101,112,156,178],"privacy":[52,104,150],"leakage.":[53],"Although":[54],"several":[55],"privacy-preserving-aggregated":[56],"schemes":[57,70,175],"have":[58],"been":[59],"proposed,":[60],"their":[61],"security":[62],"goals":[63],"are":[64,71,154],"strong":[66],"enough.":[67],"Besides,":[68],"most":[69,171],"inefficient":[72],"for":[73,91],"resource-constrained":[74],"devices.":[75],"Aiming":[76],"solving":[78],"abovementioned":[80],"problems,":[81],"this":[82],"article":[83],"proposes":[84],"a":[85],"robust":[86],"privacy-preserving":[87],"aggregation":[89],"scheme":[90,96,132,159,187],"edge-supported":[92],"IIoT.":[93],"Specifically,":[94],"adopts":[97],"Paillier":[99],"cryptosystem":[100],"protect":[102],"users.":[106],"Additionally,":[107],"it":[108],"utilizes":[109],"ECDSA":[110],"signature":[111],"support":[113],"batch":[114],"verification":[115],"multiple":[117],"signatures":[118],"from":[119],"different":[120],"signers,":[121],"which":[122],"significantly":[123],"improves":[124],"efficiency.":[125],"Security":[126],"analysis":[127],"shows":[128],"that":[129,167],"proposed":[131],"guarantees":[135],"integrity":[137],"and":[141,198,204],"mutual":[142],"authentication":[143],"among":[144],"entities":[145],"realizes":[148],"differential":[149],"protection.":[151],"Extensive":[152],"experiments":[153],"conducted":[155],"compare":[157],"our":[158,168,186],"with":[160,176,182],"related":[162,184],"work.":[163],"The":[164],"results":[165],"show":[166],"method":[169],"outperforms":[170],"compared":[174,181],"respect":[177],"communication.":[179],"Moreover,":[180],"work,":[185],"reduces":[188],"computational":[190],"cost":[191],"by":[192],"an":[193],"average":[194],"6.7%,":[196],"16.9%,":[197],"27.8%":[199],"sensor,":[201],"server,":[203],"control":[205],"center":[206],"sides,":[207],"respectively.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
