e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:03/Issue:08/August-2021 Impact Factor- 5.354 www.irjmets.com www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [141] A SECURE AND EFFICIENT ID-BASED AGGREGATE SIGNATURE SCHEME FOR WIRELESS SENSOR NETWORKS Ankur Borah *1 , Preetismaya Hazarika *2 , Gouranga Bora *3 , Topubrat Neog *4 , Dr. Purnendu Bikash Acharjee *5 *1,2,3,4 School Of Computing Science, Assam Kaziranga University, Jorhat, India. *5 Assistant Professor/Associate Dean, School Of Computer Science, Assam Kaziranga University, Jorhat, Assam, India. ABSTRACT In the field of wireless sensor networks science, having stable and efficient big data aggregation methods is very appealing. Wireless sensor networks have been widely used in real-world applications, such as target tracking and remote control of the environment. However, a wide range of attacks, such as data interception and data tampering, can easily compromise data. For wireless sensor networks, data integrity security is recommended using an identity-based aggregate signature scheme with a specified verifier. As per the benefits of aggregate signatures, this scheme will keep data privacy while also reducing bandwidth and storage costs in wireless sensor networks. Furthermore, the security of an identity-based aggregate signature scheme is rigorously addressed in the random oracle model using the computational Diffie-Hellman assumption. Data aggregation is the process of summarizing and combining sensor data in order to reduce the amount of data transmission in the network Keywords: Wireless Sensor Network, Id-Based Cryptography, Aggregate Signature, Encryption, Decryption, Data Privacy. I. INTRODUCTION WSNs have received a lot of popularity as a result of their numerous benefits, and a variety of schemes have been proposed. Sensor nodes in WSNs are usually space constrained and power constrained, and they often have minimal storage and processing capacity. As a result, unlike traditional networks, WSNs have their own set of resource constraints and architecture constraints, such as low bandwidth, short connectivity range, limited resources, and limited processing and storage in each sensor node. Data aggregation is known as the Holy Grail for lowering WSN energy consumption. The aggregator is a special sensor node with connectivity and measurement capabilities. Data centres are used for processing and storing original data obtained by devices, as well as providing information to consumers. Sensor nodes gather data from the outside world and send it to the aggregator for processing. However, the technique still has the inherent security problems, such as eavesdropping, reply attacks, data forge and data tampering, etc. Hence, designing a secure and efficient data aggregation method is very significant for WSNs. II. LITERATURE REVIEW Literature review is a text of a scholarly paper, which includes the current knowledge including substantive findings, as well as theoretical and methodological contributions to a particular topic. Literature reviews are secondary sources and do not report new or original experimental work. 1. AN EFFICIENT PRIVACY-PRESERVING OUTSOURCED COMPUTATION OVER PUBLIC DATA Authors: Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li EPOC enables users to conveniently outsource function computation to the cloud while protecting the function's and output's privacy. 2. EFFICIENT AND PRIVACY-PRESERVING OUTSOURCED CALCULATION OF RATIONAL NUMBERS Authors: Ximeng LiuRaymond Choo, Robert Deng