Skip to main content

A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT


The sensed data from Internet of Things (IoT) devices are important for accurate decision making. Thus, the data integrity, non-repudiation, data confidentiality, data freshness, etc., are necessary requirements in sensor-based IoT networks. Further, the IoT devices are resource constrained in terms of computation and communication capabilities. Hence, striking a balance between network lifetime and data security is of utmost importance. The present work explores the sensor-based IoT-specific security threats like, data modification, selective forwarding and replay attacks. Further, a scheme is proposed based on secret sharing and cryptographic hash functions which detects these attacks by a malicious entity and protects the data from passive listeners too. Extensive simulations were performed to evaluate the efficacy of the scheme, and results show that the proposed scheme outperforms previously explored schemes like SIGN-share, SHAM-share, and PIP algorithm, in terms of sensor processing time, energy consumption during in-node processing and aggregation time. Network lifetime has been further analyzed to show the efficacy of the scheme.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4


  1. Shivhare A, Singh VK, Kumar M (2020) Anticomplementary triangles for efficient coverage in sensor network-based IoT. IEEE Syst J 14(4):4854

    Article  Google Scholar 

  2. Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36

    Article  Google Scholar 

  3. Kirimtat A, Krejcar O, Kertesz A, Tasgetiren MF (2020) Future trends and current state of smart city concepts: a survey. IEEE access 8:86448

    Article  Google Scholar 

  4. Al-Turjman F, Alturjman S (2018) Confidential smart-sensing framework in the IoT era. J Supercomput 74(10):5187

    Article  Google Scholar 

  5. Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22(2):1121

    Article  Google Scholar 

  6. Satpathy S, Mohan P, Das S, Debbarma S (2020) A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. J Supercomput 76(8):5849

    Article  Google Scholar 

  7. Rathee G, Garg S, Kaddoum G, Choi BJ (2020) Decision-making model for securing IoT devices in smart industries. IEEE Trans Industr Inf 17(6):4270

    Article  Google Scholar 

  8. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of threats? a survey of practical security vulnerabilities in real IoT devices,. IEEE Int Things J 6(5):8182

    Article  Google Scholar 

  9. Sharma M, Tandon A, Narayan S, Bhushan B (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey, In 2017 3rd international conference on advances in computing, communication & automation (ICACCA)(Fall) (IEEE), pp. 1–5

  10. Marigowda C, Thriveni J, Gowrishankar S, Venugopal K (2018) An efficient secure algorithms to mitigate DoS, replay and jamming attacks in wireless sensor network, In: Proceedings of the world congress on engineering and computer science, vol. 1

  11. Choi J, Bang J, Kim L, Ahn M, Kwon T (2015) Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst J 11(2):494

    Article  Google Scholar 

  12. Zhou L, Ge C, Hu S, Su C (2019) Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks. IEEE Int Things J 7(5):3948

    Article  Google Scholar 

  13. Jose J, Princy M, Jose J (2013) PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks, In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN) (IEEE), pp. 330–336

  14. Zhou Q, Yang G, He L (2014) An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int J Distrib Sens Netw 10(1):962925

    Article  Google Scholar 

  15. Elshrkawey M, Al-Mahdi H (2021) Sda-sm: an efficient secure data aggregation scheme using separate mac across wireless sensor networks, International Journal of Computers. Commun Control 16(2):1

    Google Scholar 

  16. Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in wsns, In 2017 IEEE wireless communications and networking conference (WCNC) (IEEE), pp 1–6

  17. Yousefpoor MS, Yousefpoor E, Barati H, Barati A, Movaghar A, Hosseinzadeh M (2021) Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review. J Netw Comput Appl 190:103118

    Article  Google Scholar 

  18. Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps, In: International conference on the theory and applications of cryptographic techniques (Springer, 2003), pp 416–432

  19. Kumar V, Madria S (2013) Pip: Privacy and integrity preserving data aggregation in wireless sensor networks, In: 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (IEEE), pp 10–19

  20. Alghamdi W, Rezvani M, Wu H, Kanhere SS (2019) Routing-aware and malicious node detection in a concealed data aggregation for WSNs. ACM Trans Sensor Netw(TOSN) 15(2):1

    Article  Google Scholar 

  21. Tang W, Ren J, Deng K, Zhang Y (2019) Secure data aggregation of lightweight E-healthcare IoT devices with fair incentives. IEEE Internet Things J 6(5):8714

    Article  Google Scholar 

  22. Haseeb K, Islam N, Almogren A, Din IU, Almajed HN, Guizani N (2019) Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7:79980

    Article  Google Scholar 

  23. Pang LJ, Wang YM (2005) A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl Math Comput 167(2):840

    MathSciNet  MATH  Google Scholar 

  24. Saez Y, Estebanez C, Quintana D, Isasi P (2019) Evolutionary hash functions for specific domains. Appl Soft Comput 78:58

    Article  Google Scholar 

  25. Rasjid ZE, Soewito B, Witjaksono G, Abdurachman E (2017) Evolutionary hash functions for specific domains. Procedia Comput Sci 116:381

    Article  Google Scholar 

  26. Su Y, Gao Y, Kavehei O, Ranasinghe DC (2019) Hash functions and benchmarks for resource constrained passive devices: A preliminary study, In 2019 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) (IEEE), pp. 1020–1025

  27. Behera TM, Samal UC, Mohapatra SK (2018) Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Syst 8(5):223

    Article  Google Scholar 

  28. Behera AP, Singh A, Verma S, Kumar M (2020) Manifold learning with localized procrustes analysis based WSN localization. IEEE Sensors Lett 4(10):1

    Article  Google Scholar 

  29. Mohar SS, Goyal S, Kaur R (2022) Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics, J Supercomput, pp 1–49

  30. Yousefpoor E, Barati H, Barati A (2021) A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks, Peer-to-Peer Networking and Applications 14(4):1917

  31. Cheng Q, Hsu C, Harn L (2020) Lightweight noninteractive membership authentication and group key establishment for WSNs, Mathematical Problems in Engineering

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Anubhav Shivhare.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Shivhare, A., Maurya, M.K., Sarif, J. et al. A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT. J Supercomput (2022).

Download citation

  • Accepted:

  • Published:

  • DOI:


  • Sensors
  • IoT
  • Secret sharing
  • Cryptographic hash
  • Network security