On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things
In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that ever...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-09-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2013/806505 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850157242611924992 |
|---|---|
| author | Hong Yu Jingsha He Ruohong Liu Dajie Ji |
| author_facet | Hong Yu Jingsha He Ruohong Liu Dajie Ji |
| author_sort | Hong Yu |
| collection | DOAJ |
| description | In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don't consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes. |
| format | Article |
| id | doaj-art-2c6f30bbae2e4248bea6cba22651d58c |
| institution | OA Journals |
| issn | 1550-1477 |
| language | English |
| publishDate | 2013-09-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-2c6f30bbae2e4248bea6cba22651d58c2025-08-20T02:24:14ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-09-01910.1155/2013/806505On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of ThingsHong Yu0Jingsha He1Ruohong Liu2Dajie Ji3 College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China School of Software Engineering, Beijing University of Technology, Beijing 100124, China General Administrative Department, Beijing Development Area Co., Ltd., Beijing 100176, China Information and Technology Center, Hebei Normal University for Nationalities, Chengde, Hebei 067000, ChinaIn the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don't consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes.https://doi.org/10.1155/2013/806505 |
| spellingShingle | Hong Yu Jingsha He Ruohong Liu Dajie Ji On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things International Journal of Distributed Sensor Networks |
| title | On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things |
| title_full | On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things |
| title_fullStr | On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things |
| title_full_unstemmed | On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things |
| title_short | On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things |
| title_sort | on the security of data collection and transmission from wireless sensor networks in the context of internet of things |
| url | https://doi.org/10.1155/2013/806505 |
| work_keys_str_mv | AT hongyu onthesecurityofdatacollectionandtransmissionfromwirelesssensornetworksinthecontextofinternetofthings AT jingshahe onthesecurityofdatacollectionandtransmissionfromwirelesssensornetworksinthecontextofinternetofthings AT ruohongliu onthesecurityofdatacollectionandtransmissionfromwirelesssensornetworksinthecontextofinternetofthings AT dajieji onthesecurityofdatacollectionandtransmissionfromwirelesssensornetworksinthecontextofinternetofthings |