Manas Ranjan Mohapatra, Dr. Jitendra Sheetlani, Dr. Rasmi Ranjan Patra


 Today with the development of Internet of Things (IoT) technology its security and privacy becomes very much essential because this technology provide the facility for accessing the devices or resources from anywhere and anytime. For providing the security and privacy to IoT various technology has been developed but in this we propose data aggregation mechanism in which it uses one-time pad and symmetric key to make our data secure and preserve the privacy of it. This mechanism takes less computation time, improve processing speed and also require less cost in implementation. The implementation of proposed approach is done in widely used Python technology which produce better results. In last the proposed mechanism provide more security and preserve our data.


IoT, Aggregator, One-time Pad, Symmetric key, Privacy

Full Text:



Evans D, “The Internet of Things - How the Next Evolution of the Internet Is Changing Everything”, CISCO white paper 2011.

David K, Jefferies N, “Wireless visions: A look to the future by the fellows of the wwrf”, Vehicular Technology Magazine, IEEE dec 2012; 7(4):26–36, doi:10.1109/MVT.2012.2218433.

Mattern F, Floerkemeier C, “From active data management to event-based systems and more” Springer-Verlag, 2010.

Presser M, Krco Sa, “IOT-I: Internet of Things Initiative: Public Deliverables – D2.1: Initial report on IoT applications of strategic interest 2010”.

Atzori L, Iera A, Morabito G, “The Internet of Things: A survey. Computer Networks”, 2010; 54(15):2787 – 2805, doi:10.1016/j.comnet.2010.05.010.

J. H. Ziegeldorf, O. Garcia Morchon, and K. Wehrle, “Privacy in the Internet of Things: threats and challenges”, Security and Communication Networks 7.12 (2014): 2728-2742.

“Benetton to Tag 15 Million Items”, RFID Journal. http://bit.ly/XXe4Wi, 2003.

Albrecht K. Boycott Benetton, “No RFID tracking chips in clothing! Press Release”, http://bit.ly/49yTca, Sep 2003.

Cuijpers C, “No to mandatory smart metering does not equal privacy!”, Tilburg Institute for Law, Technology, and Society: Webblog 2009.

“The INDECT Consortium. INDECT project”, http://www.indect-project.eu/, 2009.

Munch V, “STOPP INDECT”, http://www.stopp-indect.info, 2012.

Feyza Yildirim Okay et al., “Fog computing-based privacy preserving data aggregation protocols”, Trans Emerging Tel Tech. 2020;e3900. wileyonlinelibrary.com/journal/ett © 2020 John Wiley & Sons, Ltd. 1 of 23 https://doi.org/10.1002/ett.3900

Mengyao Zheng et al., “Challenges of PrivacyPreserving Machine Learning in IoT”, AIChallengeIoT’19, November 10–13, 2019, New York, NY, USA c 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-7013-4/19/11. . . $15.00 https://doi.org/10.1145/3363347.3363357

Prem Prakash Jayaraman et al., “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation”, http://dx.doi.org/10.1016/j.future.2017.03.0010167-739X/© 2017 Published by Elsevier B.V

Yuwen Pu et al., “Two Secure Privacy-Preserving Data Aggregation Schemes for IoT”, Hindawi Wireless Communications and Mobile Computing Volume 2019, Article ID 3985232, 11 pages https://doi.org/10.1155/2019/3985232.

Rongxing Lu et al., “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT”, Article in IEEE Access • March 2017 DOI: 10.1109/ACCESS.2017.2677520

DOI: https://doi.org/10.26483/ijarcs.v11i5.6657


  • There are currently no refbacks.

Copyright (c) 2020 International Journal of Advanced Research in Computer Science