Abstract

In edge computing-enhanced wireless sensor networks (WSNs), multidimensional data aggregation can optimize the utilization of computation resources for data collection. How to improve the efficiency of data aggregation has gained considerable attention in both academic and industrial fields. This article proposes a new efficient privacy-preserving statistical aggregation scheme (EPPSA) for WSNs, in which statistical data can be calculated without exposing the total number of sensor devices to control center. The EPPSA scheme supports multiple statistical aggregation functions, including arithmetic mean, quadratic mean, weighted mean, and variance. Furthermore, the EPPSA scheme adopts the modified Montgomery exponentiation algorithms to improve the aggregation efficiency in the edge aggregator. The performance evaluation shows that the EPPSA scheme gets higher aggregation efficiency and lower communication load than the existing statistical aggregation schemes.

1. Introduction

In recent years, wireless sensor networks (WSNs) have achieved an accelerated increase in deployment. WSNs are widely utilized in scenarios such as smart homes [1], vehicular ad hoc networks [24], industrial Internet of Things [5], and monitoring environments [68]. The sensor devices in WSNs are responsible for sensing real-time data and transmitting the sensed data to control center for data analysis and intelligent control. In a variety of WSN applications, some computations are too time-consuming for sensor devices. Edge computation is an effective solution for resource-limited sensor devices to gain edge devices’ assistance, such as data aggregation and neural network models [9]. With the edge computation devices deployed near the target area, the computing load in WSN sensor devices could be distributed to the edge devices. With the help of edge computation devices, cloud data centers provide various services for numbers of applications [1013].

To reduce data redundancy and communication delay, data aggregation has become one of the most practical techniques, which can be used in edge computing-enhanced WSNs. Usually, a gateway is an ideal edge device to perform data aggregation operations due to its high computational capability, and mobile edge computing (MEC) also provides an emergent paradigm that brings computation close to mobile sensors [14]. It is worth noting that data aggregation at edge gateways may suffer from some potential security risks [15]. Firstly, the data may be captured or falsified during the delivery process, considering WSNs are usually deployed in an unattended environment. Secondly, adversaries can invade the edge gateway for stealing users’ private data. The traditional security approaches cannot be directly applied to edge computing-enhanced WSN data aggregation, since they may be conflicted with aggregation function [16]. Furthermore, due to the dynamic and heterogeneous characteristics of WSN devices, there exits difficulty for the sensed data to be collected, encrypted, used, and stored in accordance with the users’ preferences [17, 18].

To solve the above problems, homomorphic encryption algorithms have been considered to construct privacy-preserving single-dimensional aggregation schemes [1921]. Furthermore, researchers proposed several multidimensional privacy-preserving data aggregation schemes, the core idea of which is to construct a conversion mechanism between multidimensional data and large integers [19, 20, 2233]. These researches are centered on how to reduce computation costs and communication load while collecting and transmitting the data. Lu et al. [26] proposed an efficient privacy-preserving data aggregation (EPPA) scheme in smart grids. Merging multidimensional data by super-increasing sequence of large primes, Lu et al.‘s scheme is more efficient than the one-dimensional data aggregation schemes. Using a polynomial method, Shen et al. [27] constructed a user-level polynomial to store multidimensional values in a single data space based on Horner’s rule. Fault tolerance can be used to enhance the security and robustness of a data aggregation scheme. In [32], Mohammadali et al. presented a homomorphic privacy-preserving data aggregation scheme with the fault tolerance property, so it can keep data secure even if the aggregator is malicious or curious.

Most secure data aggregation schemes only consider summation-based aggregation since the underlying additive homomorphic encryption only supports the modular addition operations. In practice, various types of statistics (e.g., mean, variance and standard deviation) might often need to be supported for data application [34]. Therefore, it is necessary to design multifunctional secure data aggregation scheme supporting various data statistics. Zhang et al. [35] proposed a multifunctional secure data aggregation scheme (MODA). This scheme offers the building blocks for multifunctional aggregation by encoding raw data into well-defined vectors. Peng et al. [36] introduced a multifunctional aggregation scheme supporting diversified aggregation functions, including linear, polynomial, and continuous functions. Both of the above schemes implement the statistical functions computed by control center. For example, in [36], the ciphertext sum is generated in the edge device and the mean is calculated using the decrypted sum by control center. Thus, the total number of sensor devices is required to transmit to control center for calculating the mean by .

In lots of WSN application scenarios (e.g., industrial monitoring), the total number of sensor devices represents industrial scale which should be kept secret. Smart factories use WSNs and edge computation to create new production forms with better efficiency and flexibility. The total number of sensor devices usually represents industrial production scale in a smart factory. Usually, control center is a third-party service from the cloud or a regulatory agency from the government side. Trade secrets can be learned and used by rivals if the scale of a factory’s production is disclosed. Therefore, it is necessary to compute statistical aggregation functions without exposing the total number of WSN sensor devices. In such a scenario, the control center could use statistical data for scientific analysis and intelligent decision-making but would not have any data about the industrial production scale of the smart factory.

In this article, we propose the first privacy-preserving statistical aggregation scheme without revealing the total number of sensor devices to control center for edge computing-enhanced WSNs. The contributions of this article can be summarized as follows:(i)We construct an efficient privacy-preserving statistical aggregation scheme based on the Paillier additive homomorphic encryption scheme and the ECDSA digital signature scheme, called EPPSA. The EPPSA scheme supports multiple statistical aggregation functions, including arithmetic mean, quadratic mean, weighted mean, and variance.(ii)In the EPPSA scheme, the mean values can be calculated by the edge device and control center cooperatively, while control center does not know the total number of sensor devices. Firstly, the edge device computes the mean value in ciphertext since it has calculated the sum of the data in ciphertext.. Secondly, after receiving the mean in ciphertext, control center calculates the correct mean by using the modified extended Euclidean algorithm to process the decrypted mean. The EPPSA scheme avoids calculating and the total number of WSN sensor devices can be kept secret to control center.(iii)In the EPPSA scheme, we propose three modified Montgomery exponentiation algorithms to improve the aggregation efficiency in the edge device. Our idea is to avoid converting the data between the Montgomery domain and residue domain frequently during the whole process. The ciphertext data in the Montgomery domain can be aggregated by Montgomery multiplications, which are more efficient than ordinary modular multiplications.(iv)We implement the EPPSA scheme and compare it with the existing schemes. Compared with [28], the EPPSA scheme gets 62.5% aggregation performance improvement for 1024 bits modulus. Compared with [36], the EPPSA scheme gets 50% and 33% communication load decrease on arithmetic mean and variance statistics, respectively.

The rest of this article is organized as follows: In Section 2, the problem formulation is presented. In Section 3, the related preliminaries are reviewed. In Section 4, the proposed EPPSA data aggregation scheme is given. In Section 5, the secure analysis is given. In Section 6, the performance evaluation and comparison are presented. Finally, Section 7 concludes this article.

2. Problem Formulation

In this section, the formalized system model, the security requirements, and design goals are presented.

2.1. System Model

In the EPPSA scheme, a WSN system is comprised of four parts, namely trusted authority (TA), control center (CC), edge aggregator (EA), and sensor device (SD). The system describes a three-level topological structure, as shown in Figure 1.(i)TA is a trusted third party, which is responsible for generating and distributing the secret keys to all the system participants. In the phase of system initialization, TA sets the ECDSA key pairs into the sensor devices, edge devices, and control center. TA distributes the Paillier public key to the sensor devices, edge devices, and the Paillier private key to control center separately by sending digital envelopes over the Internet.(ii)CC is a powerful service controller of a WSN sensing system. According to special application requirements, CC is responsible for analyzing the data statistics, for example, data mining. CC is assumed to be honest-but-curious. It means that CC attempts to mine valuable information while performing its specified tasks.(iii)EA is a wireless receiving equipment that is deployed at the edge of the WSN. EA is responsible for collection, aggregation, and transmission of sensor data. EA collects encrypted data from sensor devices, aggregates the data, and transmits the aggregated data to CC. EA is a high-performance computing device so that it can perform computationally expensive processes.(iv)SD is deployed at the intended area and is responsible for sensing and communication. SDs automatically sense and encrypt the particular data before sending them to EA. For example, ambient temperature sensors record the real-time temperature in an intelligent agricultural system and report the encrypted data to CC via EA.

2.2. Security Requirements

In our system model, EA and CC are curious about SD’s privacy data, but they cannot collude with each other. Moreover, there is an adversary α assumed to have the capability to eavesdrop on data during their transit. To protect data against internal and external attacks, the following security requirements should be fulfilled:(i)Data confidentiality. Even though data from SDs or EA is eavesdropped on by α during their transit, they cannot be identified. EA cannot infer the privacy information of SDs while aggregating statistic data. When CC receives the statistics data, for example, mean, variance, it cannot identify the individual data or number of SDs.(ii)Authentication. It should be guaranteed that the data are generated by legitimate SD entities. Otherwise, malicious operations from α, for example, replay attack, may undermine the accuracy of the statistics. Similarly, the aggregate data should be guaranteed to be generated by a legitimate EA.(iii)Data integrity. Accuracy and completeness of data in transmission should be guaranteed. When an adversary α forges or modifies the data, the malicious operations should be detected by the receiver.

2.3. Design Goal

Our design goal is to design an efficient privacy-preserving statistical aggregation scheme. The following design goals should be achieved:(i)Security. The proposed scheme should satisfy the secure requirements mentioned above. The security goal is to prevent individual data and statistical data from being stolen by the adversary. In order to achieve this security goal, both internal and external behavior should be detected.(ii)Efficiency. The proposed scheme should consider computation cost and communication load. On one hand, it is necessary to use lightweight encryption and signing primitives. On the other hand, methods should be adopted to reduce the consumption of aggregate computation.(iii)Statistical aggregation. A series of data statistical functions should be supported by the proposed scheme. In an actual scenario, statistics of measurement indicators, such as mean, weighted mean, and variance, are essential for analysis. Meanwhile, except for statistics, the CC should not get any other information.

3. Preliminaries

3.1. The Paillier Cryptosystem

The Paillier cryptosystem is a widely used public key encryption scheme with additive homomorphic property [37] and is standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) in 2019 [38]. The Paillier cryptosystem consists of three parts, namely key generation, encryption, and decryption, which are described in Scheme 1.

The security of the Paillier encryption algorithm is based on the integer factoring problem. When choosing the parameter , it is necessary to judge whether is divisible by the order of . This can be efficiently checked by testing whether , where function is the greatest common divisor function.

The Paillier cryptosystem has several interesting homomorphic properties, which are associated with the statistics given below:

3.2. Mean Value Computation on Ciphertext of Paillier Cryptosystem

Shah et al. [39] proposed a solution for noninteger mean value computation in the homomorphic encrypted domain. This method can be adopted by statistical aggregation scheme in WSNs. Let be a set of numbers. The mean value, denoted by , is the sum of the values divided by the total number of elements, . In practice, the mean may result in integer or float value. Using the homomorphic property of the Paillier cryptosystem given in (2), the mean can be calculated in the encrypted domain.

If the plain domain mean is an integer, the encrypted domain mean calculated by (2) results in the correct mean after decryption. However, if the plain domain mean is a decimal, the encrypted domain mean calculated by (2) results in a large integer after decryption. For example, , where is not divisible by . After decryption, will result in , which is a large integer. Reducing the large integer to the correct mean value is a two-dimensional lattice reduction problem and can be solved by the Lagrange-Gauss lattice reduction algorithm. Shah et al. proposed an efficient method to reduce the large integer called the modified extended Euclidean algorithm . The method is shown in Algorithm 1.

Input: , , where n is the modulus and is the large number.
Output: .
(1)
(2)
(3)
(4)
(5)
(6)
(7)while do
(8)
(9)
(10)
(11)
(12)end while
(13)return

The modulus of Paillier cryptosystem and large integer value can be considered as independent points in a two-dimensional lattice space . These two basis vectors, and , can be reduced for optimal values. Algorithm 1 computes the reduced value of using adapted extended Euclidean algorithm, which is the correct mean value.

3.3. Montgomery Multiplication

Montgomery multiplication (MM) is an efficient technique for computing modular multiplications [40]. Assuming an odd modulus is a t-bit number, let . For integers , the Montgomery multiplication is . By taking r as a power of 2, the division becomes simple shifting. The process of MM is presented in Algorithm 2.

(i)Input: , , , where is computed by the extended Euclidean algorithm.
Output: .
(1)
(2)
(3)
(4) if , then return
(ii)  else return

Utilizing the MM algorithm, the Montgomery exponentiation is present in Algorithm 3. For a number , the corresponding number in the Montgomery domain is denoted by .

(i)Input: , , , where is computed by the extended Euclidean algorithm.
Output: .
(1)
(2)
(3) For down to 0
(4)  
(5)  if , then
(6)
(7) return

4. The Proposed EPPSA Scheme

In this section, we propose the first privacy-preserving statistical aggregation scheme without revealing the total number of sensor devices to control center. In order to achieve the security goals, the edge device and control center calculates the statistics cooperatively, while control center does not know the total number of sensor devices. The Paillier cryptosystem is used as the encryption scheme and the ECDSA algorithm [41] is used as the signature scheme.

The EPPSA scheme consists of four phases including system initialization, data encryption, secure statistical aggregation, and secure statistics reading. In the system initialization phase, TA initializes the WSN system by generating and distributing the secret keys of the Paillier and ECDSA algorithms. In the data encryption phase, sensor device SDi collects raw data and encrypts these data to generate a data report. Then sensor device sends the encrypted data report to EA via wireless networks. In the secure statistical aggregation phase, EA calculates sum and mean value in the encrypted domain and sends the statistical report to CC. In this phase, EA does not reveal the total number of sensor devices to CC. In the secure statistics reading phase, CC decrypts the statistical report and calculates the quadratic mean and variance of each dimension. Finally, CC gets all the arithmetic mean, quadratic mean, weighted mean, and variance without knowing the total number of sensor devices. Furthermore, to achieve the improvement in aggregation performance, we present three modified Montgomery exponentiation algorithms. Using these algorithms, EPPSA avoids frequent conversion of exponentiation results between the Montgomery domain and residue domain.

4.1. Modified Montgomery Exponentiation Algorithms

We modified Algorithm 3 to improve the aggregation performance. Three modified algorithms below map the result of modular exponentiation into the Montgomery domain.

4.1.1. Modified Montgomery exponentiation 1

The modified Montgomery exponentiation method 1 () is described in Algorithm 4.

(i)Input: , , , where is computed by the extended Euclidean algorithm.
Output:
(1)
(2)
(3) For down to 0
(4)  
(5)  if , then
(6)return

Compared with Algorithm 3, Algorithm 4 removes the step , which converts the result into the correct domain . This denotes that the exponentiation result is still in the Montgomery domain. The result of exponentiation is denoted by to be distinguished from the one in Algorithm 3.

4.1.2. Modified Montgomery Exponentiation 2

The modified Montgomery exponentiation method 2 () is described in Algorithm 5.

(i)Input: , , , where is computed by the extended Euclidean algorithm.
Output:
(1)
(2) For down to 0
(3)  
(4)  if , then
(5)return

Compared with Algorithm 3, Algorithm 5 removes the step and . The base number and result of Algorithm 5 are both in the Montgomery domain and are denoted by and , respectively, to be distinguished from the ones in Algorithm 3.

4.1.3. Modified Montgomery Exponentiation 3

The modified Montgomery exponentiation method 3 () is described in Algorithm 6.

(i)Input: , , , where is computed by the extended Euclidean algorithm.
Output:
(1)
(2) For down to 0
(3)  
(4)  if , then
(5)
(6) return

Compared with Algorithm 3, Algorithm 6 removes the step . The base number of Algorithm 6 is in the Montgomery domain and is denoted by to be distinguished from the one in Algorithm 3.

Using these algorithms, encrypted data are converted to the Montgomery domain at the beginning of the process during the process. Then encrypted data are kept in the Montgomery domain for further computation. In the end, the results are reconverted back to the residue (non-Montgomery) domain. By reducing the conversions between the Montgomery domain and the residue domain, the aggregation operation can be accelerated.

4.2. System Initialization

In the proposed system model, we assume that there are m SDs in WSN, which are denoted by . Each device generates an l-dimensional data vector . Each gets an identity and EA gets an identity . The data in a region can be denoted by a matrix

Given secure parameters and , TA initializes the parameters of the additive homomorphic encryption algorithm and digital signature algorithm. The key generation procedure is shown as follows:Step 1: TA chooses prime numbers p, q randomly, where . Let and . Choose , with , and the order of is a multiple of . Then, TA generates the encryption key , where the encryption public key is and decryption private key is .Step 2: TA chooses an Elliptic curve group of an order with base point (generator) G, which is over the finite field of integers modulo a prime . The bit length of and should be set as the security parameter, that is, . For each SDi (), TA chooses a secret key of digital signature randomly. TA sets the public key of the digital signature . The signature key of SDi is . The signature keys of EA, CC, and TA are generated in the same way, which are denoted by , , and , respectively. The signature algorithm makes use of a hash function .Step 3: Via a secure channel, TA sends the encryption public key and the signature private key to SDi (). It sends the encryption public key , the signature public key , and the signature private key to EA. It sends the decryption private key and the signature public key to CC.

After key generation, TA distributes the encryption keys and signing keys. The key distribution procedure is shown as follows:Step 1: TA writes signature key pair into the senor device SDi () before deploying the sensor device. TA writes the signature public key and the signature key pair into EA before deploying the edge device. TA sends the signature public key and to CC through the Internet and give the signature key pair to CC by a USB key device.Step 2: Using the private key , TA computes a digital signature on denoted by . Using CC’s public key , TA generates a digital envelope on the Paillier private key and the signature denoted by . TA sends the to CC through the Internet.Step 3: After receiving the digital envelope , CC decrypts it and gets the Paillier private key and the signature . Using the public key , CC verifies the signature. If the verification is passed, the Pallier private key will be accepted.

4.3. Data Report Generation

Each sensor device SDi, , performs the following phases to get a data report:(i)Generate: The SDi firstly generates the raw data vector . Then SDi calculates the corresponding quadratic data vector . Given a weight vector , SDi calculates the weighted data vector by .(ii)Encrypt: After generating the l-dimensional data vectors , , and , sensor device SDi encrypts the data using the Paillier encryption algorithm. When calculating the ciphertexts, EPPSA uses to convert the results to the Montgomery domain. These result of , , and are denoted by , , and , respectively.(iii)Sign: Timestamp is denoted by TS, and the identity of SDi is denoted by . SDi chooses an instance key . Calculate and . The signature is achieved by .(iv)Send: SDi sends the data report to EA.

4.4. Statistical Aggregation

After receiving the data reported from m sensor devices, EA performs the following steps to generate the statistical aggregation report:(i)Verify: EA firstly calculates . Then, EA checks the validity of by verifying the equation .(ii)Aggregate: If the validity equation holds, EA executes the aggregation operations. EA firstly calculates the arithmetic sum, quadratic sum, and weighted sum of each dimension, which are denoted by , , and , , respectively. When calculating the sum, EA uses the method (Algorithm 3) for modular multiplication. Then EA calculates arithmetic mean, quadratic mean, and weighted mean of each dimension, which are denoted by , , and , , respectively. When calculating the mean by Equation 2, EA uses (Algorithm 5) for modular exponentiation. The result is denoted by . The details of the aggregation are shown in Algorithm 7.(iii)Sign: Timestamp is denoted by TS, and the identity of EA is denoted by . EA chooses an instance key . Calculate and . The signature is achieved by .(iv)Send: EA sends the data report to CC.

(i)Input: Vectors , where m.
Output: Ciphertext of arithmetic mean, mean of square, and weighted mean in the Montgomery domain of each dimension, denoted by , , and , .
(1), , ,
(2) for up to
(3)  for up to
(4)   ,
(5)   
(6)for up to
(ii) for up to
(8)   ,
(9)   
(10) for up to
(11)  for up to
(12)   ,
(13)   
(14)return
4.5. Statistical Report Decryption

After receiving the data report reported from EA, EA performs the following steps to decrypt the statistical aggregation report:

(i)Verify: EA firstly calculates . The EA checks the validity of by verifying the equation .(ii)Decrypt: If the validity equation holds, CC executes the decryption operations using . When calculating the decryption, CC uses the (Algorithm 6) for modular exponentiation. The result is (iii)Reduce: Considering that the decryption result of the mean may be a large integer with no sense, CC reduces each decryption result using Algorithm 2. CC takes elements in the decrypted data vector and the modulus as inputs and gets the reduced data vector .(iv)Post-Process: The reduced data vector includes arithmetic mean, mean of square, and weighted mean of each dimension. For each dimension, CC calculates the quadratic mean by equation (3) and variance by equation (4). Finally, CC gets the result of arithmetic mean, quadratic mean, weighted mean, and variance of each dimension, denoted by .

5. Security Analysis

In this section, we analyze the security properties of the proposed EPPSA scheme, following the security requirements and design goals given in Section 2.

Lemma 1. The result of encryption in the Montgomery domain is a valid format of the ciphertext.

Proof 1. The residue (non-Montgomery) system is a commutative ring denoted by , and the Montgomery domain is a commutative ring denoted by . The rings and are isomorphic by the isomorphism defined by and defined by . Due to the isomorphism, the result of encryption in the Montgomery domain is a valid format of the ciphertext.

5.1. Resistance to Eavesdropping Attack

Theorem 1. WSN devices’ private data and statistics cannot be obtained by an adversary α even if it is eavesdropped during transmitting.

Proof 2. In the EPPSA scheme, the data are encrypted by the Paillier cryptosystem. According to Lamma 1, the result of encryption in the Montgomery domain is a valid format of the ciphertext. Meanwhile, the private key is transmitted to CC in digital envelope. The is encrypted by CC’s public key so that α cannot get it. Since Paillier cryptosystem is provably secure against the chosen plaintext attack based on the decisional Diffie—Hellman problem, α cannot guess the plaintext in a nonnegligible probability without the private key . Similarly, α cannot obtain statistics by eavesdropping on the transmission between EA and CC. In a word, the data and statistics in transmission are semantically secure.

5.2. Resistance to Replay Attack

Theorem 2. If a replayed data report is transmitted to EA, or a statistical report to CC, it can be detected.

Proof 3. If an adversary α replays the data report to aggregator EA, it needs to forge a new timestamp donated by . Since the timestamp is new, α has to forge a new signature of the replayed ciphertext . The security of the ECDSA system is based on the computational intractability of the discrete logarithm problem (DLP). The signature key pair is written to SDi directly when system initialization. Thus, α cannot guess the correct signature of the replayed report in a nonnegligible probability without the private key . Similarly, the replay attack of the statistical report to CC can be detected for the same reason. In a word, the EPPSA scheme is resistant to replay attack.

5.3. Resistance to Manipulation Attack

Theorem 3. If an adversary α manipulates the data report from WSN senor device or statistics from EG, it can be detected.

Proof 4. It is assumed that an adversary α manipulates the encrypted data during the transmission to aggregator EA. When receiving the data report, EA calculates the hash value and checks the signature by verifying the equation . If is manipulated, the hash value will be incorrect and the signature will not be validated. Similarly, when receiving statistical report from EA, CC calculates the hash value and checks the signature by verifying the equation . The statistical report is considered invalid if it is manipulated by α. In a word, the integrity of data and statistics can be satisfied.

5.4. Resistance to Internal Attack

Theorem 4. If EA is an internal attacker which is curious about WSN devices’ privacy data, it still cannot obtain the actual data of the devices.

Proof 5. According to Lemma 1, the encrypted data from WSN sensor devices in the Montgomery domain is a valid format of the ciphertext. The aggregator EA does not have the private key to decrypt the ciphertext.

Theorem 5. If CC is an internal attacker which is curious about the total number of WSN devices, it still cannot obtain the actual number of the devices.

Proof 6. CC obtains the arithmetic mean, quadratic mean, and weighted mean by decryption and reduction. Also, CC calculates the variance by Equation (3), which uses plaintext of arithmetic mean and quadratic mean. In a word, CC does not get any information on the total number of WSN devices when calculating statistics.

6. Performance Evaluation and Comparison

In this section, our scheme is evaluated in terms of computation costs and communication costs. The performance results are compared with the scheme proposed in references [28, 31, 33, 36].

6.1. Computation Cost

Assume that there are m sensor devices SDi in the system and each of them reports an l-dimensional data vector for both our EPPSA scheme and schemes in [28, 31, 33]. For the fairness of comparison, these schemes are assumed to get moduli with the same bit length.

In our EPPSA scheme, the modified Montgomery exponentiations (Algorithms 4, 5, and 6) are used to keep the result of exponentiation in the Montgomery domain. That means the aggregation in EA only needs Montgomery multiplications. Let TMM and TOMM be the time cost of a Montgomery multiplication operation and an ordinary modular multiplication operation, respectively. And time cost of a Montgomery exponentiation is denoted by TME. In our proposed EPPSA scheme, benefitting from the modified Montgomery exponentiations, is needed. In [28], the aggregation of each dimension is calculated by . In [31], the aggregation of each dimension is calculated by . In [33], the cost of aggregation is . A comparative summary of computation cost for m SDs aggregation is listed in Table 1.

To evaluate the performance, we execute the experiments on a Laptop with Windows 10 OS, Intel® Core™ i5-700U 2.50 GHz and 16 GB RAM. And we utilize the OpenSSL library (OpenSSL 1.1.1 h) to provide basic cryptographic primitives. For the evaluation of the EPPSA scheme, we set the n to be 512 and 1024 bits in the Paillier Cryptosystem, and the n2 to be 1024 and 2048 bits. As the number of dimensions changes, we get the comparison of aggregation computation costs of 1024 bits in Figure 2(a), and the computation costs of 2048 bits in Figure 2(b). In summary, Figure 2 clearly shows that compared with schemes in [28, 31, 33], EPPSA has the smallest computation cost. For example, compared with [28], the EPPSA scheme gets 62.5% aggregation performance improvement on 1024 bits.

6.2. Communication Cost

Among the previous edge-aided aggregation schemes, the scheme in [36] is the only one that offers statistical functions. Therefore, we compare the communication costs of the EPPSA scheme with the scheme in [36]. We consider the communication costs of arithmetic mean and variance for fairness. For the sake of instruction, we denote the bit length of the modulus by .

In [36], EA needs to transmit the aggregated ciphertext of summation and counter to CC for arithmetic mean, in which the communication cost is . In our EPPSA scheme, EA needs to send aggregated ciphertext of arithmetic mean to CC, in which the communication cost is . In [36], EA needs to transmit the aggregated ciphertext of summation, quadratic summation, and counter to CC for variance, in which the communication cost is . In our EPPSA scheme, EA needs to send aggregated ciphertext of arithmetic mean and quadratic mean to CC, in which the communication cost is . Figure 3 shows the communication cost comparison of EPPSA and [36] in different bit lengths. It can be demonstrated that the communication cost of the EPPSA scheme decreases by 50% on arithmetic mean and 33% on variance.

7. Conclusion

In this article, we present an efficient privacy-preserving statistical aggregation scheme for edge computing-enhanced WSNs. The EPPSA scheme adopts the Paillier encryption scheme and ECDSA signature algorithm to guarantee data confidentiality, authentication, and data integrity. Compared with the existing multidimensional and multifunctional data aggregation schemes, the EPPSA scheme improves the efficiency of aggregation and decreases the communication load. Furthermore, the EPPSA scheme improves privacy protection by hiding the total number of devices in the data report. The EPPSA scheme can be applied in various WSN scenarios, such as smart factory, health care, and environmental monitoring.

Data Availability

The data used in the experiments will be available upon request.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this article.

Acknowledgments

This work was supported by the Key Research and Development Program of Shandong Province (the Major Scientific and Technological Innovation Project of Shandong Province) under Grant no. 2020CXGC010114.