<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Reducing the WSN's Communication Overhead by the SD-SPDZ Encryption Protocol</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander K. Alexandrov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Current Encryption Techniques</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Robotics, Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. G. Bonchev str., 1113 Sofia</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Limited Resources: WSN nodes typically have limited processing capability, memory, and energy. Dynamic Network Topology: Nodes can join or leave, posing challenges for key management. Physical Vulnerability: Sensor nodes may be deployed in hostile environments</institution>
          ,
          <addr-line>susceptible to physical attacks</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Wireless Sensor Networks (WSN) have emerged as a pivotal technology in many application areas such as environmental monitoring, IoT, military applications, and healthcare. These networks consist of spatially distributed, autonomous sensors that cooperatively monitor physical or environmental conditions, such as temperature, sound, or pollution levels. The unique characteristics of WSNs, including their resource constraints (e.g., energy, memory, and computational capacity), make them vulnerable to various security threats. Information security in WSNs is crucial to ensure the confidentiality, integrity, and availability of the data they collect and transmit. As these wireless sensors collect and share data, they ensure the security and privacy of transmitted information becomes critical. In recent years, with an increasing emphasis on security, there has been a growing interest in Multi-Party Computation (MPC). MPC allows multiple parties to compute a joint function over their inputs while keeping those inputs private. The SPDZ protocol is among the most prominent and influential secure computation protocols. While the initial SPDZ protocol and its successor, SPDZ-2, have shown promising results, there were still challenges related to performance, scalability, and overall security. This paper presents a newly developed protocol named SD-SPDZ (Sensor Data SPDZ). The proposed protocol is based on MPC SPDZ-2 protocol and proposes changes to increase the performance in the preprocessing phase by implementing a new algorithm for the Beaver triples calculation. This protocol enhances the privacy-preserving attributes and eficiency of its predecessors. SD-SPDZ integrates advanced cryptographic techniques, ofering a more robust and scalable solution for secure computations in WSNs. The primary benefits include reduced communication overhead, faster computation times, and improved resistance against various cyberattacks. The integration of SD-SPDZ in WSNs could improve performance sensitively and change the way sensor data is securely processed in sensor networks. It provides a promising pathway to ensure that as technology advances, the integrity and confidentiality of the data in these networks remain uncompromised. In summary, as WSNs play an increasingly critical role in modern-day applications, the need for advanced highperformance security mechanisms such as the SD-SPDZ protocol becomes more evident. This combination of cutting-edge, high-performance, secure computation with wireless sensor networks promise a future where data can be both globally accessible and privately computed, bridging the gap between performance and privacy.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;WSN</kwd>
        <kwd>Information security</kwd>
        <kwd>sensor data encryption</kwd>
        <kwd>SPDZ</kwd>
        <kwd>SD-SPDZ</kwd>
        <kwd>Fixed Block Ciphers</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Wireless Sensor Networks (WSN) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] are being used in
numerous applications ranging from environmental
monitoring to defense and healthcare. The distributed nature
of WSNs and their deployment in potentially hostile
environments make data encryption crucial to ensure data
confidentiality, integrity, and authenticity. Historically,
traditional encryption algorithms such as Advanced
Encryption Standard (DES) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Data Encryption
Standard (DES) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] were evaluated for WSNs. However, due
to resource constraints in WSN nodes, some additional
encryption techniques gained popularity.
      </p>
      <sec id="sec-1-1">
        <title>Lightweight Block Ciphers: They require less computa</title>
        <p>
          tional power and memory [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>
          Stream Ciphers: Focus on processing data bit-by-bit,
requiring minimal memory [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Examples are Trivium and
Grain.
        </p>
        <p>
          Public Key Cryptography: Though resource-intensive,
they can be optimized for specific tasks like initial key
exchange [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          Multi-Party Computation: Multi-Party Computation
(MPC) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] is a subfield of cryptography that enables
multiple parties to jointly compute a function over their inputs
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>without revealing those inputs to each other.</p>
      <p>The main benefits of the MPC based encryption
protocols are: In the area of the existing approaches, protocols, and</p>
      <p>
        Privacy: Ensures that individual inputs remain secret algorithms used to reduce the encrypted
communicafrom other participants. tion overhead in WSNs the following is commonly used
Correctness: Guarantees that the output is correct even nowadays: BGW Protocol: The Beimel, Malkin, and
Miif some participants behave maliciously. cali (BGW) protocol [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is one of the foundational works
      </p>
      <p>This essential in some WSN’s as: in the area of secure multi-party computation. SPDZ can
Secure voting systems where voters want to compute be viewed as a descendant of the BGW protocol, where
the result without revealing individual votes; both focus on achieving security against a malicious
adMilitary applications; versary.</p>
      <p>
        Collaborative data analysis in medical research where TinyOT: An eficient protocol [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for two-party
compuinstitutions want to compute a joint result without shar- tation, TinyOT inspired many techniques used in SPDZ,
ing patient data directly. especially the ones in the preprocessing phase.
Overdrive2K: Overdrive refers to optimizations and
enhance1.1. Sensor data encryption techniques ments of the SPDZ protocol, further improving the
eficiency of the ofline phase [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        With the rising proliferation of the Internet of Things MASCOT: A follow-up to SPDZ, MASCOT introduces
(IoT) and the widespread deployment of sensor networks a more eficient method [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] for the preprocessing phase
across various industries, ensuring the confidentiality, by using oblivious transfer instead of somewhat
homoauthenticity, and integrity of sensor data has become morphic encryption, reducing computational overhead.
paramount. This study delves deep into the techniques SPDZ2k: The SPDZ2k protocol [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] has been adjusted
and strategies employed for sensor data encryption, fo- to operate with calculations based on powers of two.
cusing on the unique challenges and requirements pre- The significant dificulty with this is that in Z2k, not
sented by these environments. every component has an inverse, an essential factor for
ensuring the security of both MASCOT and SPDZ. To
Objectives address this, SPDZ2k shifts to Z2k’, where k’ is a greater
value, to ofset the presence of zero divisors.
      </p>
      <p>
        To understand the peculiarities and constraints of sen- MP-SPDZ: provides a complete implementation of
sor data. To evaluate existing encryption methodologies SPDZ2k [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and features its distinct Z2k version, which
suitable for sensor data. To propose eficient techniques is optimized for compile-time k.SPDZ-2: An optimized
or improvements tailored for sensor data encryption. version of the original SPDZ, it enhances the online phase
for better eficiency.
      </p>
      <p>
        Characteristics of Sensor Data BMR. Beaver and colleagues introduced a method [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
Sensor data can be distinguished by: to create garbled circuits from any multi-party
computation framework while maintaining security attributes.
• High volume: Many sensors generate data con- This method was later enhanced by Lindell and team by
tinuously. employing SPDZ as the foundational protocol. MP-SPDZ
• Temporal relevance: Some data may be time- integrates BMR with the SPDZ/MASCOT protocol and
sensitive. other security model protocols. Even though this feature
• Varying importance: Not all sensor data is equally wasn’t included in SPDZ-2, it was unveiled partially prior
critical. to MP-SPDZ’s first edition, as it was utilized by Keller
and Yanai in their oblivious RAM development.
      </p>
      <p>
        Challenges in Sensor Data Encryption Yao’s Garbled Circuits. Bellare and co-authors
showcased a version of Yao’s garbled circuits optimized for
• Resource Limitations: Sensors often have con- DES-NI, which is the standard DES execution on
contemstrained processing capabilities, energy, and mem- porary processors [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. After the final release of SPDZ-2,
ory. this version was incorporated and recently updated to
• Transmission Overheads: Encryption might in- encompass the half-gate method.
      </p>
      <p>troduce additional latency or payload.
• Diverse Deployment: Sensors can be found in 2.1. SPDZ and SPDZ-2 Encryption
hostile environments, making them susceptible Protocols Overview
to physical attacks.</p>
      <sec id="sec-2-1">
        <title>The SPDZ protocol is a foundational Multi-Party Computation (MPC) scheme known for its robust security</title>
        <sec id="sec-2-1-1">
          <title>Secret Sharing in SPDZ</title>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Given a secret , it is split into additive shares 1, 2, 3, 4 . . . ,  such that:</title>
      </sec>
      <sec id="sec-2-3">
        <title>In the preprocessing phase, a Beaver’s triples (, , )</title>
        <p>are generated where  =  × . During the online phase,
given shares of values  and  that need to be multiplied,
the protocol proceeds as:</p>
        <p>Compute
 = ∑︁</p>
        <p>=1 .
  =  − 
  =  − .</p>
        <sec id="sec-2-3-1">
          <title>Basics of the SPDZ-2 Protocol</title>
          <p>guarantees and practical eficiency. SPDZ facilitates
secure computation among multiple parties as connected
sensor modules, ensuring that individual inputs remain
private.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Reduced Communication Overhead: By leveraging MACs</title>
        <p>and eficient consistency checks, SPDZ-2 reduces the
number of rounds of communication, which is especially
beneficial in settings with many parties. To ensure
consistency of shares and validity of the triples, MACs (Message
Authentication Codes) are utilized.</p>
        <p>The preprocessing phase is made more eficient,
leading to faster overall computation times. At the same time,
when applied to wireless sensor networks, the SPDZ-2
protocol can still exhibit considerable communication
overhead. Sensor networks have bandwidth constraints,
limited battery life, and operate in high-latency
environments, making communication eficiency crucial.</p>
        <sec id="sec-2-4-1">
          <title>SPDZ-2 Protocol implementation in Wireless</title>
        </sec>
        <sec id="sec-2-4-2">
          <title>Sensor Networks (WSN)</title>
        </sec>
      </sec>
      <sec id="sec-2-5">
        <title>Wireless Sensor Networks (WSN) typically consist of spa</title>
        <p>tially distributed autonomous devices that cooperatively
monitor physical or environmental conditions.</p>
        <p>Applying the SPDZ-2 protocol in WSN enables secure
collaborative data processing without revealing
individual sensor readings.</p>
        <p>For a WSN with n sensor nodes, let each node i have
a private value . The goal is to compute a function
 (1, 2, . . . , ) securely.</p>
        <sec id="sec-2-5-1">
          <title>Secret sharing in WSN</title>
          <p>A sensor node’s private value  is split into additive
secret shares distributed among other nodes such that:
 = ∑︁
=1
ℎ</p>
          <p>×  =  +   ×  +   ×  +   ×</p>
          <p>In the online phase both values  and  where
are computed as:
 = ∑︁</p>
          <p>=1 ,
 = ∑︁</p>
          <p>=1 
 +  = ∑︁
=1
( + )</p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>Each sensor module locally adds its shares. Using</title>
        <p>Beaver’s triple, multiplication can be securely performed
as outlined above.</p>
        <p>The SPDZ protocol also integrates zero-knowledge
proofs to ensure correctness without revealing individual
inputs or intermediate results.</p>
        <p>Mathematically, SPDZ employs techniques from
linear secret-sharing schemes to ensure zero-knowledge
properties.</p>
      </sec>
      <sec id="sec-2-7">
        <title>For shared values  and , use preprocessed triples</title>
        <p>(, , ) where  =  × .</p>
        <p>Calculate and open
Sensor nodes verify the validity of MACs without reveal- The SPDZ-2 protocol, when applied to sensor networks,
ing their private values. still has a significant communication overhead. This
is especially problematic for wireless sensor networks,
Communication Model in WSN which may have limited bandwidth or be subjected to
high-latency communication environments.
(9)
(10)
(11)
(12)</p>
        <p>Node Failures</p>
        <p>Solution: Employ error-correcting codes for share
recovery and design the protocol to be resilient to node
dropouts.</p>
        <p>Security Considerations</p>
        <p>In WSN, the threat model may difer, with concerns of
node capture or eavesdropping. The security of SPDZ-2
in such a model ensures:
• Privacy: Individual sensor readings are kept
con</p>
        <p>ifdential.
• Integrity: The outcome of the computation is
cor</p>
        <p>rect even if some nodes are malicious.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Case study</title>
      <p>3.1. Sensor Data Communication
Overhead in the SPDZ-2 Protocol
and
  =  − ,
  =  − ,
to all nodes. Each node locally computes
 ×  =  +   ×  +   ×  +   ×  .</p>
      <sec id="sec-3-1">
        <title>Zero-Knowledge Proofs</title>
        <sec id="sec-3-1-1">
          <title>To ensure consistency of shares and validity of the triples,</title>
          <p>
            MACs (Message Authentication Codes) [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ] are utilized.
Given a MAC key  , and a value , the MAC is:
  =  × .
          </p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Given the energy and bandwidth constraints in WSN, the application of SPDZ-2 requires eficient communication models, possibly hierarchical or cluster-based, to minimize overhead.</title>
          <p>In WSN, sensor nodes can be viewed as parties in
the MPC. Each node can hold a piece of the secret (i.e.,
its measurement) and wants to perform computations
without revealing its exact measurement to others.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Sensor Data Aggregation</title>
        <sec id="sec-3-2-1">
          <title>For an aggregate function  over sensor data</title>
          <p>1, 2, . . . , :
 (1, 2, . . . , ) = ∑︁
=1
 ().</p>
          <p>(13)</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Using SPDZ-2, the function  can be computed in a dis</title>
          <p>tributed manner without revealing individual  values.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Challenges and Solutions in WSN</title>
        <p>Bandwidth Constraint</p>
        <p>Solution: Use compact secret sharing schemes and
optimize communication patterns, possibly adopting
hierarchical sensor node structures where cluster heads
manage intra-cluster communication.</p>
        <p>Energy Constraint</p>
        <p>Solution: Minimize interactive rounds in the protocol
and consider energy-eficient cryptographic operations.
Asynchronous operations can be adapted to allow nodes
to enter low-energy states when not actively
participating.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Communication Overhead in SPDZ</title>
        <p>The communication overhead in the SPDZ protocol
primarily arises from:
• Calculation, sharing and, reconstructing values
in the preprocessing phase.
• Exchanging values during the online phase for
operations like multiplication using Beaver’s triples.
• Zero-knowledge proofs ensure honesty and
correctness.</p>
      </sec>
      <sec id="sec-3-5">
        <title>Strategies to Reduce Communication Overhead</title>
        <sec id="sec-3-5-1">
          <title>Before initiating the SPDZ protocol, sensors can locally</title>
          <p>aggregate or summarize their data. For instance, instead
of sending individual readings, sensors can send averages
or other statistical summaries over a time window.</p>
          <p>Group multiple operations together, especially during
the preprocessing phase. This can help amortize the cost
of generating and distributing values like Beaver’s triples
over multiple operations.</p>
          <p>Instead of running individual proofs for each operation,
consider batched or aggregated proofs that can cover
multiple operations at once.</p>
          <p>Implement secret sharing schemes that are tailored
for sensor networks. These can focus on minimizing
the number of shares or using techniques like
errorcorrecting codes to handle lost or delayed shares without
retransmission.</p>
          <p>Employ data compression algorithms to reduce the size Function FixedKey_DDESES_Encrypt(input_block):
of the transmitted data. This can be especially efective // Define a fixed key; this remains constant.
if sensor readings or intermediate values in the SPDZ FIXED_KEY = "32-byte key derived
protocol have redundancy or predictable patterns. from a secure process"</p>
          <p>Instead of all-to-all communication, consider using
relay nodes or hierarchical structures where a subset of // Use DES encryption with the fixed key.
sensors aggregates data and communicates with other ciphertext = DES_Encrypt(FIXED_KEY,
groups, reducing the total communication across the net- input_block)
work. return ciphertext</p>
          <p>Instead of continuous computation, synchronize the End Function
computation in intervals. This allows for more batched
operations and fewer real-time communication require- Function FixedKey_DES_Decrypt(ciphertext):
ments. Reducing the communication overhead in the // Define the same fixed key.
SPDZ protocol when applied to sensor networks requires FIXED_KEY = "32-byte key derived from
a combination of algorithmic optimizations, architectural a secure process"
considerations, and leveraging domain-specific knowl- // Use DES decryption with the fixed key.
edge of sensor data. Implementing the above strategies plaintext = DES_Decrypt(FIXED_KEY,
can significantly enhance the eficiency of the SPDZ pro- ciphertext)
tocol in sensor environments. return plaintext</p>
          <p>The current paper focuses on the algorithms related to End Function
reducing the communication overhead in the
preprocessing phase of the SPZD-2 protocol. One of the possible The FIXED_KEY should be securely generated,
preferways to reduce the communication overhead in the pre- ably using a cryptographically secure random number
processing phase of the SPDZ protocol in WSNs is to use generator, and then kept constant for all future
operatechnique such Fixed-key block ciphers. tions. Storing cryptographic keys securely is essential.</p>
          <p>
            Fixed-key block ciphers [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ], as the name suggests, Depending on the application, you might consider using
involve the use of block ciphers with a fixed, predefined hardware security modules, secure key storage services,
key. The idea behind using a fixed key is to transform or other best practices.
the block cipher into a deterministic function with pseu- It is essential to ensure that the input_block has an
dorandom behavior. appropriate size for the block cipher is used. For DES,
          </p>
          <p>Standard Block Cipher: A standard block cipher can this would typically be 128 bits (or 16 bytes). For the
be denoted as: same input, the output will always be the same since the
key remains constant.
 : {0, 1} × { 0, 1} → {0, 1} (14) Since block ciphers are permutations for a given key,
the process is reversible. If you know the fixed key, you
where  is the encryption function. The first parameter is can decrypt any ciphertext produced by the fixed-key
a key of length  bits. The second parameter is a plaintext block cipher to retrieve the original input.
block of length  bits. The output is a ciphertext block In the context of secure multi-party computation
of length  bits. For a given key  and plaintext  , the (SMPC), fixed-key block ciphers can be used to produce
encryption is denoted as correlated randomness between parties or derive other
types of structured randomness eficiently.</p>
          <p>=  (,  ) (15) One notable application is in the generation of
"obliviFixed-Key Block Cipher: When we talk about a ous pseudorandom functions" (OPRFs) where one party
ifxed-key block cipher, the key remains constant. This learns the output of a PRF on a specific input without
can be represented as: the other party learning anything about the input or the
output.
 : {0, 1} → {0, 1}</p>
          <p>(16)
where  is a predefined constant key. For any input
block  , the output is  (,  ).</p>
          <p>With the key fixed, a block cipher behaves like a pseu- Beaver triples and fixed-key block ciphers are both
techdorandom permutation (PRP) over the set of -bit strings. niques used within the realm of secure multi-party
comThis means that for every input  , there is a unique out- putation (SMPC). While they serve diferent primary
put , and the relationship appears random unless you functions and can sometimes be complementary, they can
know the fixed key. also be seen as alternative techniques in specific settings.</p>
        </sec>
      </sec>
      <sec id="sec-3-6">
        <title>Integration between Beaver triple and Fixed-Key</title>
      </sec>
      <sec id="sec-3-7">
        <title>Block Ciphers</title>
        <p>
          Primarily used for securely computing multiplication Generation of : Each party  generates a random
in SMPC protocols, Beaver triples [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] consist of prepro- value. Each party computes:
cessed random multiplicative triples (a,b,c) where c=a×b.
        </p>
        <p>These triples allow parties to perform multiplication on  =  () (17)
secret-shared values without revealing their actual in- and broadcast it. The shared value  is the sum of the 
puts. values.</p>
        <p>The generation of Beaver triples can be computation- Generation of : Each party  generates a random
ally intensive, especially in protocols that require a large value . Each party computes:
number of such triples. However, once generated, they
make the online phase of the computation faster. Used  =  () (18)
widely in SMPC protocols like SPDZ and its variants. and broadcast it. The shared value  is the sum of the 
They are fundamental for protocols that rely on secret values.
sharing and require multiplication operations. Generation of : The shared value  =  ×  is</p>
        <p>Beaver Triples ofer strong security guarantees when computed. However, instead of interacting to verify the
generated correctly. Their security relies on the fact that correctness of this multiplication, the sensor modules
the triples are random and independent of the inputs on can use the fact that they have encryption of the values
which they will be used.  and . They can derive the product of the encrypted</p>
        <p>Fixed-Key Block Ciphers: Used to generate certain values, given the properties of the fixed-key block cipher
types of correlated randomness in SMPC. A fixed-key and the determinism of their chosen function. This step
block cipher is a pseudo-random function where the key avoids the need for complex interactive proofs, hence
remains constant. Given the same input, it will always removing the original need for Beaver triples.
produce the same output, but changing even one bit of
the input will produce a substantially diferent output.</p>
        <p>
          Typically, block ciphers are relatively eficient,
especially in hardware implementations. Using them to
produce correlated randomness can sometimes be more
eficient than generating Beaver triples, depending on the
protocol and context. Often used in oblivious
pseudorandom function (OPRF) [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] contexts and other settings
where correlated randomness or specific patterns of
randomness are required.
        </p>
        <p>The security here typically depends on the underlying
block cipher’s robustness and resistance against
cryptographic attacks. If a cryptographically secure block
cipher is used, the fixed-key variant can provide strong
security guarantees for its purpose.
function generate_triples_using_block_cipher():
# a-values
a_i = random_value()
A_i = Encrypt_with_fixed_key(key_i, a_i)
broadcast(A_i)
a = sum_of_broadcasted_A_values
# b-values
b_i = random_value()
B_i = Encrypt_with_fixed_key(key_i, b_i)
broadcast(B_i)
b = sum_of_broadcasted_B_values
# Compute c using encrypted values and
# properties of the block cipher
c= compute_all_A_values, all_B_values)
return (a, b, c)
3.2. Reducing the Sensor Data</p>
        <p>Communication Overhead in the</p>
        <p>SD-SPDZ Protocol</p>
        <sec id="sec-3-7-1">
          <title>Utilizing fixed-key block ciphers to substitute the Beaver</title>
          <p>triple generation in the SPDZ preprocessing phase is an
advanced topic in secure multi-party computation, and
this approach is at the core of the new proposed SD-SPDZ
protocol. Lab environment</p>
          <p>The idea behind this technique is to use block ciphers,
like DES, to deterministically generate shared random- The lab environment consists of a cluster-based sensor
ness, which can be used to produce Beaver triples. network consisting of five sensor modules based on NUCs
The high-level approach for this is: Gigabyte and control center shown in the picture below:
Key Generation: Each party selects a secret key for The testing software is implemented in each sensor
the block cipher (e.g., DES). module and at the cluster head (CH). The experimental</p>
          <p>Beaver triple generation using Fixed-Key Block Ci- results are shown in the table below which describes the
phers: average time in seconds to compute 10.000 triples in a
WSN cluster consisting of five sensor nodes:</p>
        </sec>
        <sec id="sec-3-7-2">
          <title>This approach dramatically simplifies the preprocess</title>
          <p>ing phase compared to the standard SPDZ protocol with
Beaver triples and reduces the sensor data
communication overhead. However, it assumes that the fixed-key
block cipher has certain properties that make this method
secure and that the encryption/decryption operations are
performed in a secure manner.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <sec id="sec-4-1">
        <title>This paper presents a newly developed protocol named</title>
        <p>SD-SPDZ (Sensor Data SPDZ). The proposed protocol is
based on MPC SPDZ-2 protocol and proposes changes
to increase the performance in the preprocessing phase
by implementing a new algorithm for the Beaver triples
calculation.</p>
        <p>This protocol enhances the privacy-preserving
attributes and eficiency of its predecessors. SD-SPDZ
integrates advanced cryptographic techniques, ofering a
more robust and scalable solution for secure
computations in WSNs. The primary benefits include reduced
communication overhead, faster computation times, and
improved resistance against various cyberattacks.</p>
      </sec>
      <sec id="sec-4-2">
        <title>The integration of SD-SPDZ in WSNs could improve</title>
        <p>performance sensitively and change the way sensor data
is securely processed in sensor networks. It provides
a promising pathway to ensure that as technology
advances, the integrity and confidentiality of the data in
these networks remain uncompromised.</p>
        <p>In summary, as WSNs play an increasingly critical
role in modern-day applications, the need for advanced
high-performance security mechanisms such as the
SDSPDZ protocol becomes more evident. This combination
of cutting-edge, high-performance, secure computation
with wireless sensor networks promises a future where
data can be both globally accessible and privately
computed, bridging the gap between performance and
privacy.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pinar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zuhair</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hamad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Resit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Shiva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Omar</surname>
          </string-name>
          ,
          <article-title>Wireless sensor networks (WSNs)</article-title>
          ,
          <source>in: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>Des-co-rsa: A hybrid encryption algorithm based on DES and RSA</article-title>
          , in: 2023
          <source>IEEE 3rd International Conference on Power, Electronics and Computer Applications</source>
          (ICPECA), IEEE,
          <year>2023</year>
          , pp.
          <fpage>846</fpage>
          -
          <lpage>850</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <article-title>A new asic implementation of an advanced encryption standard (AES) cryptohardware accelerator</article-title>
          ,
          <source>Microelectronics Journal</source>
          <volume>117</volume>
          (
          <year>2021</year>
          )
          <fpage>105255</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Feng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <article-title>Hdlbc: A lightweight block cipher with high difusion</article-title>
          ,
          <source>Integration</source>
          <volume>94</volume>
          (
          <year>2024</year>
          )
          <fpage>102090</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Noura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Salman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Couturier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chehab</surname>
          </string-name>
          , Lesca:
          <article-title>Lightweight stream cipher algorithm for emerging systems</article-title>
          ,
          <source>Ad Hoc Networks</source>
          <volume>138</volume>
          (
          <year>2023</year>
          )
          <fpage>102999</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Pavani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sriramya</surname>
          </string-name>
          ,
          <article-title>Enhancing public key cryptography using RSA, RSA-CRT and N-prime RSA with multiple keys</article-title>
          ,
          <source>in: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Saha, Multi-party computation in iot for privacy-preservation</article-title>
          ,
          <source>in: 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)</source>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>1280</fpage>
          -
          <lpage>1281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Gennaro</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Di Raimondo, Secure multiplication of shared secrets in the exponent</article-title>
          ,
          <source>Information processing letters</source>
          <volume>96</volume>
          (
          <year>2005</year>
          )
          <fpage>71</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Hazay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Scholl</surname>
          </string-name>
          , E. Soria-Vazquez,
          <article-title>Low cost constant round MPC combining bmr and oblivious transfer</article-title>
          ,
          <source>Journal of cryptology 33</source>
          (
          <year>2020</year>
          )
          <fpage>1732</fpage>
          -
          <lpage>1786</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Orsini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Smart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Vercauteren</surname>
          </string-name>
          ,
          <article-title>Overdrive2k: eficient secure MPC over from somewhat homomorphic encryption</article-title>
          ,
          <source>in: Cryptographers' Track at the RSA Conference</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>254</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Damgård</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pastro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Smart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zakarias</surname>
          </string-name>
          ,
          <article-title>Multiparty computation from somewhat homomorphic encryption</article-title>
          , in: Annual Cryptology Conference, Springer,
          <year>2012</year>
          , pp.
          <fpage>643</fpage>
          -
          <lpage>662</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Cramer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Damgård</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Escudero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Scholl</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Xing, SPDZ2k: eficient MPC mod 2k for dishonest majority</article-title>
          ,
          <source>CRYPTO</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13] M. Keller, Mp-spdz:
          <article-title>A versatile framework for multi-party computation</article-title>
          ,
          <source>in: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1575</fpage>
          -
          <lpage>1590</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bottarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Karadimas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Epiphaniou</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. K. B. Ismail</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Maple</surname>
          </string-name>
          ,
          <article-title>Adaptive and optimum secret key establishment for secure vehicular communications</article-title>
          ,
          <source>IEEE Transactions on Vehicular Technology</source>
          <volume>70</volume>
          (
          <year>2021</year>
          )
          <fpage>2310</fpage>
          -
          <lpage>2321</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>H.-J. Kim</surname>
            ,
            <given-names>H.-I.</given-names>
          </string-name>
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.-W.</given-names>
          </string-name>
          <string-name>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>A privacypreserving kNN classification algorithm using Yao's garbled circuit on cloud computing</article-title>
          ,
          <source>in: 2017 IEEE 10th international conference on cloud computing (CLOUD)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>766</fpage>
          -
          <lpage>769</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ansari</surname>
          </string-name>
          ,
          <article-title>Privacy preserving distributed data mining based on secure multi-party computation</article-title>
          ,
          <source>Computer Communications</source>
          <volume>153</volume>
          (
          <year>2020</year>
          )
          <fpage>208</fpage>
          -
          <lpage>216</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Arumugam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Praba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Radhakrishnan</surname>
          </string-name>
          ,
          <article-title>Study of chaos functions for their suitability in generating message authentication codes</article-title>
          ,
          <source>Applied Soft Computing</source>
          <volume>7</volume>
          (
          <year>2007</year>
          )
          <fpage>1064</fpage>
          -
          <lpage>1071</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Eficient and secure multiparty computation from fixed-key block ciphers</article-title>
          ,
          <source>in: 2020 IEEE Symposium on Security and Privacy (SP)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>825</fpage>
          -
          <lpage>841</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J. B. Nielsen</surname>
            ,
            <given-names>P. S.</given-names>
          </string-name>
          <string-name>
            <surname>Nordholt</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Orlandi</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          <string-name>
            <surname>Burra</surname>
          </string-name>
          ,
          <article-title>A new approach to practical active-secure two-party computation</article-title>
          , in: Annual Cryptology Conference, Springer,
          <year>2012</year>
          , pp.
          <fpage>681</fpage>
          -
          <lpage>700</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Casacuberta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hesse</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Lehmann,
          <article-title>SoK: Oblivious pseudorandom functions</article-title>
          ,
          <source>in: 2022 IEEE 7th European Symposium on Security</source>
          and
          <string-name>
            <surname>Privacy (EuroS&amp;P),</surname>
            <given-names>IEEE</given-names>
          </string-name>
          ,
          <year>2022</year>
          , pp.
          <fpage>625</fpage>
          -
          <lpage>646</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>