Skip to main content
Erschienen in: The Journal of Supercomputing 10/2018

10.08.2018

Confidential smart-sensing framework in the IoT era

verfasst von: Fadi Al-Turjman, Sinem Alturjman

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the revolution of the Internet technology, smart-sensing applications and the Internet of Things (IoT) are coupled in critical missions. Wireless sensor networks (WSNs), for example, present the main enabling technology in IoT architectures and extend the spectrum of their smart applications. However, this technology has limited resources and suffers from several vulnerabilities and security issues. Since the wireless networks used by this technology are deployed in open areas, several challenges are faced by the service provider in terms of privacy and the quality of service. Encryption can be a good solution to preserve confidentiality and privacy, but it raises serious problems concerning time latency and performance. In this paper, we propose agile framework that enables authentication, confidentiality and integrity while collecting the sensed data by using elliptic curve cryptography.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef
3.
Zurück zum Zitat Debnath A, Singaravelu P, Verma S (2014) Privacy in wireless sensor networks using ring signature. J King Saud Univ Comput Inf Sci 26(2):228–236 Debnath A, Singaravelu P, Verma S (2014) Privacy in wireless sensor networks using ring signature. J King Saud Univ Comput Inf Sci 26(2):228–236
4.
Zurück zum Zitat Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sens Actuators, A 156:394–405CrossRef Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sens Actuators, A 156:394–405CrossRef
5.
Zurück zum Zitat Sarigiannidis P, Karapistoli E, Economides A (2015) Detecting Sybil attacks in Wireless Sensor Networks using UWB ranging-based information. Expert Syst Appl 42:7560–7572CrossRef Sarigiannidis P, Karapistoli E, Economides A (2015) Detecting Sybil attacks in Wireless Sensor Networks using UWB ranging-based information. Expert Syst Appl 42:7560–7572CrossRef
6.
Zurück zum Zitat Al-Turjman F (2018) QoS–aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT. Comput Commun 121:33–43CrossRef Al-Turjman F (2018) QoS–aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT. Comput Commun 121:33–43CrossRef
7.
Zurück zum Zitat Demir S, Al-Turjman F (2018) Energy scavenging methods for WBAN applications: a review. IEEE Sens J 18(16):6477–6488CrossRef Demir S, Al-Turjman F (2018) Energy scavenging methods for WBAN applications: a review. IEEE Sens J 18(16):6477–6488CrossRef
8.
Zurück zum Zitat Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, LondonCrossRef Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, LondonCrossRef
9.
Zurück zum Zitat Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599–616CrossRef Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599–616CrossRef
10.
Zurück zum Zitat Zkik K, Orhanou G, El Hajji S (2016) Secure scheme on mobile multi cloud computing based on homomorphic encryption. In: Proceeding of the International Conference on Engineering & MIS (ICEMIS), pp 1–7 Zkik K, Orhanou G, El Hajji S (2016) Secure scheme on mobile multi cloud computing based on homomorphic encryption. In: Proceeding of the International Conference on Engineering & MIS (ICEMIS), pp 1–7
11.
Zurück zum Zitat Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744CrossRef Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744CrossRef
12.
Zurück zum Zitat Al-Turjman F (2017) Information-centric framework for the internet of things (IoT): traffic modelling & optimization. Future Gener Comput Syst 80(1):63–75 Al-Turjman F (2017) Information-centric framework for the internet of things (IoT): traffic modelling & optimization. Future Gener Comput Syst 80(1):63–75
13.
Zurück zum Zitat Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. In: Towards a quarter-century of public key cryptography. pp 103–123CrossRef Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. In: Towards a quarter-century of public key cryptography. pp 103–123CrossRef
14.
Zurück zum Zitat Gura N, Patel A, Wander A, Eberle H, Chang Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 3156:119–132CrossRef Gura N, Patel A, Wander A, Eberle H, Chang Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 3156:119–132CrossRef
16.
Zurück zum Zitat Rodrigues JJ, de la Torre I, Fernández G, López-Coronado M (2013) Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 15(8):e186CrossRef Rodrigues JJ, de la Torre I, Fernández G, López-Coronado M (2013) Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 15(8):e186CrossRef
17.
Zurück zum Zitat Cheng L, Li W, Ma D (2015) Secret key generation via random beamforming in stationary environment. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp 1–5 Cheng L, Li W, Ma D (2015) Secret key generation via random beamforming in stationary environment. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp 1–5
Metadaten
Titel
Confidential smart-sensing framework in the IoT era
verfasst von
Fadi Al-Turjman
Sinem Alturjman
Publikationsdatum
10.08.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2524-1

Weitere Artikel der Ausgabe 10/2018

The Journal of Supercomputing 10/2018 Zur Ausgabe