Skip to main content
Top
Published in: Wireless Personal Communications 2/2019

26-10-2018

Lightweight Security Scheme for Internet of Things

Authors: Ahmed Aziz, Karan Singh

Published in: Wireless Personal Communications | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The compressive sensing method presents itself as a promising technique in many fields specially for the Internet of Things and Wireless sensor networks applications. That is because, the compressive sensing has the major advantage of performing lightweight encryption and compression simultaneously. It leads to secure the network in addition to prolong the network life time. However, chosen plaintext attacks and key distribution are still major challenges facing the compressive sensing method. This paper focuses on the compressive sensing method according to security issue, and propose an efficient lightweight security scheme that addressee the previous challenges. Moreover, we use experimental data collected from a real sensors located in Intel Berkeley Research Lab.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A. K., Leppakoski, H., et al. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5(99), 1. Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A. K., Leppakoski, H., et al. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5(99), 1.
2.
go back to reference Palopoli, L., Passerone, R., & Rizano, T. (2011). Scalable offline optimization of industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 7(2), 328–329.CrossRef Palopoli, L., Passerone, R., & Rizano, T. (2011). Scalable offline optimization of industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 7(2), 328–329.CrossRef
3.
go back to reference Mollin, R. A. (2006). An introduction to cryptography. Boca Raton: CRC Press.MATH Mollin, R. A. (2006). An introduction to cryptography. Boca Raton: CRC Press.MATH
4.
go back to reference Vanstone, S. A., Menezes, A. J., & Oorschot, P. C. (1999). Handbook of applied cryptography. Boca Raton: CRC Press.MATH Vanstone, S. A., Menezes, A. J., & Oorschot, P. C. (1999). Handbook of applied cryptography. Boca Raton: CRC Press.MATH
5.
go back to reference Fragkiadakis, A., Tragos, E., & Traganitis, A. (2014). Lightweight and secure encryption using channel measurements. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace, Aalborg (pp. 1–5). Fragkiadakis, A., Tragos, E., & Traganitis, A. (2014). Lightweight and secure encryption using channel measurements. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace, Aalborg (pp. 1–5).
7.
go back to reference Candes, E. J., & Tao, T. (2006). Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Transactions on Information Theory, 52(12), 5406–5425.MathSciNetCrossRefMATH Candes, E. J., & Tao, T. (2006). Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Transactions on Information Theory, 52(12), 5406–5425.MathSciNetCrossRefMATH
8.
go back to reference Cossalter, M., Valenzise, G., Tagliasacchi, M., & Tubaro, S. (2010). Joint compressive video coding and analysis. IEEE Transactions on Multimedia, 12(3), 168183.CrossRef Cossalter, M., Valenzise, G., Tagliasacchi, M., & Tubaro, S. (2010). Joint compressive video coding and analysis. IEEE Transactions on Multimedia, 12(3), 168183.CrossRef
9.
go back to reference Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.CrossRef Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.CrossRef
10.
go back to reference Li, Z., Xu, W., Miller, R., & Trappe, W. (2006). Securing wireless systems via lower layer enforcements, In Proceedings of the WiSe (pp. 33–42). Li, Z., Xu, W., Miller, R., & Trappe, W. (2006). Securing wireless systems via lower layer enforcements, In Proceedings of the WiSe (pp. 33–42).
11.
go back to reference Dautov, R., & Tsouri, G. (2013). Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In Proceedings of ICNC (pp. 354–358). Dautov, R., & Tsouri, G. (2013). Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In Proceedings of ICNC (pp. 354–358).
12.
go back to reference Fragkiadakis, L., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., & Surligas, M. (2016). Signal processing techniques for energy efficiency, security, and reliability in the IoT domain (pp. 19–447). New York: Springer. Fragkiadakis, L., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., & Surligas, M. (2016). Signal processing techniques for energy efficiency, security, and reliability in the IoT domain (pp. 19–447). New York: Springer.
13.
go back to reference Rachlin, Y., & Baron, D. (2008). The secrecy of compressed sensing measurements. In Proceedings of 46th annual Allerton conference on communication, control, and computing (pp. 813–817). Rachlin, Y., & Baron, D. (2008). The secrecy of compressed sensing measurements. In Proceedings of 46th annual Allerton conference on communication, control, and computing (pp. 813–817).
14.
go back to reference Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., & Setti, G. (2015). Low-complexity multiclass encryption by compressed sensing. IEEE Transactions on Signal Processing, 63, 21832195.MathSciNetMATH Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., & Setti, G. (2015). Low-complexity multiclass encryption by compressed sensing. IEEE Transactions on Signal Processing, 63, 21832195.MathSciNetMATH
15.
go back to reference Yu, L., Barbot, J. P., Zheng, G., & Sun, H. (2010). Compressive sensing with chaotic sequence. IEEE Signal Processing Letters, 17(8), 731734. Yu, L., Barbot, J. P., Zheng, G., & Sun, H. (2010). Compressive sensing with chaotic sequence. IEEE Signal Processing Letters, 17(8), 731734.
16.
go back to reference Zhang, L., Wong, K., Li, C., & Zhang, Y. (2014). Towards secure compressive sampling scheme. CoRR. Zhang, L., Wong, K., Li, C., & Zhang, Y. (2014). Towards secure compressive sampling scheme. CoRR.
17.
go back to reference Fragkiadakis, A., Kovacevic, L., & Tragos, E. (2016). Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In Proceedings of the 2nd workshop on experiences in the design and implementation of smart objects (pp. 17–22). Fragkiadakis, A., Kovacevic, L., & Tragos, E. (2016). Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In Proceedings of the 2nd workshop on experiences in the design and implementation of smart objects (pp. 17–22).
18.
go back to reference Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A novel image encryption algorithm based on improved 3D Chaotic Cat Map. In The 9th international conference for young computer scientists. Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A novel image encryption algorithm based on improved 3D Chaotic Cat Map. In The 9th international conference for young computer scientists.
19.
go back to reference Candes, E., & Tao, T. (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, 52(52), 145–156.MathSciNetMATH Candes, E., & Tao, T. (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, 52(52), 145–156.MathSciNetMATH
20.
go back to reference Baraniuk, R. G. (2007). Compressive sensing. IEEE Signal Processing Magazine, 24(4), 118–121.CrossRef Baraniuk, R. G. (2007). Compressive sensing. IEEE Signal Processing Magazine, 24(4), 118–121.CrossRef
21.
go back to reference Mallat, S. (1999). A wavelet tour of signal processing. Cambridge: Academic Press.MATH Mallat, S. (1999). A wavelet tour of signal processing. Cambridge: Academic Press.MATH
22.
go back to reference Venkataramani, R., & Bresler, Y. (1998). Sub-nyquist sampling of multiband signals: Perfect reconstruction and bounds on aliasing error. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 12–15). Venkataramani, R., & Bresler, Y. (1998). Sub-nyquist sampling of multiband signals: Perfect reconstruction and bounds on aliasing error. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 12–15).
23.
go back to reference Tropp, J., & Gilber, A. (2007). Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(14), 4655–4666.MathSciNetCrossRefMATH Tropp, J., & Gilber, A. (2007). Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(14), 4655–4666.MathSciNetCrossRefMATH
24.
go back to reference Donoho, D., Yaakov, T., Drori, I., & Jean, S. (2012). Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Transactions on Information Theory, 58(2), 1094–1121.MathSciNetCrossRefMATH Donoho, D., Yaakov, T., Drori, I., & Jean, S. (2012). Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Transactions on Information Theory, 58(2), 1094–1121.MathSciNetCrossRefMATH
25.
go back to reference Deanna, N., & Roman, V. (2009). Uniform uncertainty principle and signal recovery via regularized orthogonal matching pursuit. Foundations of Computational Mathematics, 9(3), 317–334.MathSciNetCrossRefMATH Deanna, N., & Roman, V. (2009). Uniform uncertainty principle and signal recovery via regularized orthogonal matching pursuit. Foundations of Computational Mathematics, 9(3), 317–334.MathSciNetCrossRefMATH
26.
go back to reference Luo, C., Wu, F., Sun, J., & Chen, C. W.(2009). Compressive data gathering for large-scale wireless sensor networks. In Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom 09 (pp. 145–156), New York, NY, USA. Luo, C., Wu, F., Sun, J., & Chen, C. W.(2009). Compressive data gathering for large-scale wireless sensor networks. In Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom 09 (pp. 145–156), New York, NY, USA.
27.
go back to reference Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference (pp. 3005–3014). Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference (pp. 3005–3014).
Metadata
Title
Lightweight Security Scheme for Internet of Things
Authors
Ahmed Aziz
Karan Singh
Publication date
26-10-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6035-4

Other articles of this Issue 2/2019

Wireless Personal Communications 2/2019 Go to the issue