{"id":"https://openalex.org/W3036766443","doi":"https://doi.org/10.1109/wcnc45663.2020.9120843","title":"Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks","display_name":"Post Quantum Security Solution for Data Aggregation in Wireless Sensor Networks","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3036766443","doi":"https://doi.org/10.1109/wcnc45663.2020.9120843","mag":"3036766443"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc45663.2020.9120843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc45663.2020.9120843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085800532","display_name":"Aarti Amod Agarkar","orcid":"https://orcid.org/0000-0002-0756-0487"},"institutions":[{"id":"https://openalex.org/I4210163301","display_name":"Sinhgad Dental College and Hospital","ror":"https://ror.org/0522w3m69","country_code":"IN","type":"healthcare","lineage":["https://openalex.org/I4210163301"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aarti Amod Agarkar","raw_affiliation_strings":["Sinhgad College of Engineering, Pune, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Sinhgad College of Engineering, Pune, Maharashtra, India","institution_ids":["https://openalex.org/I4210163301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017543357","display_name":"Mandar Karyakarte","orcid":"https://orcid.org/0000-0003-3472-4923"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mandar Karyakarte","raw_affiliation_strings":["Vishwakarma Institute of Information Technology, Pune, Maharashtra, India"],"affiliations":[{"raw_affiliation_string":"Vishwakarma Institute of Information Technology, Pune, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036792516","display_name":"Himanshu Agrawal","orcid":"https://orcid.org/0000-0001-6616-8605"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Himanshu Agrawal","raw_affiliation_strings":["Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085800532"],"corresponding_institution_ids":["https://openalex.org/I4210163301"],"apc_list":null,"apc_paid":null,"fwci":1.8558,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88398974,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7375748157501221},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7287880182266235},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6706997156143188},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.586718738079071},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.5601156949996948},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.517762303352356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5131295323371887},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.48687806725502014},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.4727112948894501},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.45035749673843384},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.41028526425361633},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33982357382774353},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26196563243865967}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7375748157501221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7287880182266235},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6706997156143188},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.586718738079071},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.5601156949996948},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.517762303352356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5131295323371887},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.48687806725502014},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.4727112948894501},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.45035749673843384},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.41028526425361633},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33982357382774353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26196563243865967},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wcnc45663.2020.9120843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc45663.2020.9120843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:e80dea09-4908-4423-a641-d87826ff3328/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/456456","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2020 IEEE Wireless Communications and Networking Conference (WCNC), 25-28 May 2020, Seoul, Korea (South), Vol. 2020-May","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1584554406","https://openalex.org/W1788452017","https://openalex.org/W1854943636","https://openalex.org/W1967399643","https://openalex.org/W2027423568","https://openalex.org/W2047020183","https://openalex.org/W2054373987","https://openalex.org/W2068688360","https://openalex.org/W2071210649","https://openalex.org/W2071825329","https://openalex.org/W2077244027","https://openalex.org/W2084652510","https://openalex.org/W2091857136","https://openalex.org/W2105103777","https://openalex.org/W2108834246","https://openalex.org/W2128957919","https://openalex.org/W2132172731","https://openalex.org/W2135205181","https://openalex.org/W2140132783","https://openalex.org/W2143514931","https://openalex.org/W2143761236","https://openalex.org/W2151672144","https://openalex.org/W2168676717","https://openalex.org/W2430154064","https://openalex.org/W2735676894","https://openalex.org/W2736502269","https://openalex.org/W2754327167","https://openalex.org/W2787953190","https://openalex.org/W2898154631","https://openalex.org/W3023423392","https://openalex.org/W4302596635","https://openalex.org/W6777542107"],"related_works":["https://openalex.org/W2312500729","https://openalex.org/W2518050971","https://openalex.org/W2026228941","https://openalex.org/W3106998306","https://openalex.org/W1484081998","https://openalex.org/W2985442649","https://openalex.org/W2902659942","https://openalex.org/W4289129300","https://openalex.org/W2963996977","https://openalex.org/W2235903869"],"abstract_inverted_index":{"Data":[0],"aggregation":[1,53,106],"has":[2],"been":[3],"one":[4,39],"of":[5,25,40,101,112],"the":[6,21,26,30,41,104,109,118,132],"most":[7],"widely":[8],"researched":[9],"topics":[10],"for":[11,51,54,99],"Wireless":[12],"Sensor":[13],"Network":[14],"(WSN)":[15],"as":[16],"it":[17],"helps":[18],"in":[19,103],"increasing":[20],"effective":[22],"life":[23],"time":[24],"network":[27],"and":[28,69,124,137,150],"reduces":[29],"packet":[31],"transmission":[32],"overhead.":[33],"Besides":[34],"other":[35],"challenges,":[36],"security":[37,50,83],"is":[38,91,135],"serious":[42],"challenges":[43],"during":[44,126],"data":[45,52,102,105],"aggregation.":[46],"Numerous":[47],"solutions":[48,68],"on":[49,58],"WSN":[55],"are":[56,71],"based":[57,67,148,153],"homomorphic":[59,152],"encryption":[60,100],"technique":[61],"or":[62],"Elliptic":[63,143],"Curve":[64,144],"Cryptography":[65],"(ECC)":[66],"thus":[70],"vulnerable":[72],"to":[73,142],"attacks":[74],"by":[75],"quantum":[76],"machines.":[77],"This":[78],"paper":[79],"presents":[80],"a":[81],"post-quantum":[82],"solution":[84,90],"using":[85],"lattice":[86],"cryptography.":[87],"The":[88],"proposed":[89,119,133],"applying":[92],"Learning":[93],"with":[94],"Errors":[95],"over":[96],"Rings":[97],"(R-LWE)":[98],"process":[107],"at":[108],"gateway":[110],"module":[111],"WSN.":[113],"Security":[114],"analysis":[115,129],"shows":[116,130,138],"that":[117,131],"scheme":[120,134,149],"provides":[121],"confidentiality,":[122],"integrity":[123],"authenticity":[125],"communication.":[127],"Performance":[128],"lightweight":[136],"better":[139],"performance":[140],"compared":[141],"Elgamal":[145],"(ECEG)":[146],"cryptography":[147],"symmetric":[151],"scheme.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
