Skip to main content
Erschienen in: Telecommunication Systems 1/2016

01.05.2016

Secure and efficient data transmission in the Internet of Things

Erschienen in: Telecommunication Systems | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, the concept of the Internet of Things (IoT) has drawn considerable attention from both industry and academia. In the IoT, millions of objects with sensors collect data and send the data to servers that analyze, manage and use the data in order to construct some kinds of smart systems, such as smart grid, intelligent transportation systems, healthcare systems and even smart city. It is critical to establish a secure channel between the sensors and servers in order to ensure the correctness of collected data. If the collected data is tampered, the results of data analysis is unbelievable, and may even bring serious disaster. In this paper, we propose a heterogeneous ring signcryption scheme for secure communication from sensors to servers. We prove that this scheme has the indistinguishability against adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeability against adaptive chosen messages attacks under the computational Diffie–Hellman problem in the random oracle model. Our scheme has the following advantages (1) it simultaneously achieves confidentiality, integrity, authentication, non-repudiation and anonymity in a logical single step; (2) it is heterogeneous and allows a sensor node in an identity-based cryptography to send a message to a server in a public key infrastructure. These features make our scheme suitable for data transmission in the IoT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef
2.
Zurück zum Zitat Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: Open issues and challenges. Wireless Networks, 20(8), 2201–2217.CrossRef Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: Open issues and challenges. Wireless Networks, 20(8), 2201–2217.CrossRef
3.
Zurück zum Zitat Wang, C., Jiang, C., Liu, Y., Li, X. Y., & Tang, S. (2014). Aggregation capacity of wireless sensor networks: Extended network case. IEEE Transactions on Computers, 63(6), 1351–1364.CrossRef Wang, C., Jiang, C., Liu, Y., Li, X. Y., & Tang, S. (2014). Aggregation capacity of wireless sensor networks: Extended network case. IEEE Transactions on Computers, 63(6), 1351–1364.CrossRef
4.
Zurück zum Zitat Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the Internet: A security analysis. Internet Research, 19(2), 246–259.CrossRef Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the Internet: A security analysis. Internet Research, 19(2), 246–259.CrossRef
5.
Zurück zum Zitat Stankovic, J. A. (2014). Research directions for the Internet of things. IEEE Internet of Things Journal, 1(1), 3–9.CrossRef Stankovic, J. A. (2014). Research directions for the Internet of things. IEEE Internet of Things Journal, 1(1), 3–9.CrossRef
6.
Zurück zum Zitat Shargal, M., & Houseman, D. (2009). The big picture of your coming smart grid. Smart Grid News. Shargal, M., & Houseman, D. (2009). The big picture of your coming smart grid. Smart Grid News.
7.
Zurück zum Zitat Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security and Privacy, 11(6), 74–76.CrossRef Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security and Privacy, 11(6), 74–76.CrossRef
8.
Zurück zum Zitat Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the Internet of things. Computer, 46(4), 46–53.CrossRef Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the Internet of things. Computer, 46(4), 46–53.CrossRef
9.
Zurück zum Zitat Keoh, S. L., Kumar, S. S., & Tschofenig, H. (2014). Securing the Internet of things: A standardization perspective. IEEE Internet of Things Journal, 1(3), 265–275.CrossRef Keoh, S. L., Kumar, S. S., & Tschofenig, H. (2014). Securing the Internet of things: A standardization perspective. IEEE Internet of Things Journal, 1(3), 265–275.CrossRef
10.
Zurück zum Zitat Li, F., & Xiong, P. (2013). Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 13(10), 3677–3684.CrossRef Li, F., & Xiong, P. (2013). Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 13(10), 3677–3684.CrossRef
11.
Zurück zum Zitat Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in Cryptology-ASIACRYPT 2005, LNCS 3788. Heidelberg: Springer. Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in Cryptology-ASIACRYPT 2005, LNCS 3788. Heidelberg: Springer.
12.
Zurück zum Zitat Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature&encryption) \(\ll \)cost (signature) + cost(encryption). In Advances in Cryptology-CRYPTO’97, LNCS 1294. Heidelberg: Springer. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature&encryption) \(\ll \)cost (signature) + cost(encryption). In Advances in Cryptology-CRYPTO’97, LNCS 1294. Heidelberg: Springer.
13.
Zurück zum Zitat Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.CrossRef Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.CrossRef
14.
Zurück zum Zitat Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef
15.
Zurück zum Zitat Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32(3), 586–615.CrossRef Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32(3), 586–615.CrossRef
16.
Zurück zum Zitat Ren, K., Lou, W., Zeng, K., & Moran, P. J. (2007). On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11), 4136–4144.CrossRef Ren, K., Lou, W., Zeng, K., & Moran, P. J. (2007). On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11), 4136–4144.CrossRef
17.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Bu, J. (2012). SDRP: A secure and distributed reprogramming protocol for wireless sensor networks. IEEE Transactions on Industrial Electronics, 59(11), 4155–4163.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). SDRP: A secure and distributed reprogramming protocol for wireless sensor networks. IEEE Transactions on Industrial Electronics, 59(11), 4155–4163.CrossRef
18.
Zurück zum Zitat Boyen, X. (2003). Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In Advances in Cryptology-CRYPTO 2003, LNCS 2729 (pp. 383–399). Heidelberg: Springer. Boyen, X. (2003). Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In Advances in Cryptology-CRYPTO 2003, LNCS 2729 (pp. 383–399). Heidelberg: Springer.
19.
Zurück zum Zitat Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In Public Key Cryptography-PKC 2005, LNCS 3386. Heidelberg: Springer. Chen, L., & Malone-Lee, J. (2005). Improved identity-based signcryption. In Public Key Cryptography-PKC 2005, LNCS 3386. Heidelberg: Springer.
20.
Zurück zum Zitat Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef
21.
Zurück zum Zitat Li, F., Zhang, H., & Takagi, T. (2013). Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3), 420–429.CrossRef Li, F., Zhang, H., & Takagi, T. (2013). Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3), 420–429.CrossRef
22.
Zurück zum Zitat Rivest, R. L., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In Advances in Cryptology-ASIACRYPT 2001, LNCS 2248. Heidelberg: Springer. Rivest, R. L., Shamir, A., & Tauman, Y. (2001). How to leak a secret. In Advances in Cryptology-ASIACRYPT 2001, LNCS 2248. Heidelberg: Springer.
23.
Zurück zum Zitat Debnath, A., Singaravelu, P., & Verma, S. (2014). Privacy in wireless sensor networks using ring signature. Journal of King Saud University-Computer and Information Sciences, 26(2), 228–236. Debnath, A., Singaravelu, P., & Verma, S. (2014). Privacy in wireless sensor networks using ring signature. Journal of King Saud University-Computer and Information Sciences, 26(2), 228–236.
24.
Zurück zum Zitat Li, C. K., Yang, G., Wong, D. S., Deng, X., & Chow, S. S. M. (2010). An efficient signcryption scheme with key privacy and its extension to ring signcryption. Journal of Computer Security, 18(3), 451–473. Li, C. K., Yang, G., Wong, D. S., Deng, X., & Chow, S. S. M. (2010). An efficient signcryption scheme with key privacy and its extension to ring signcryption. Journal of Computer Security, 18(3), 451–473.
25.
Zurück zum Zitat Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA 2005 (pp. 649–654). Taiwan, Taipei. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA 2005 (pp. 649–654). Taiwan, Taipei.
26.
Zurück zum Zitat Qi, Z., Yang, G., Ren, X., & Li, Y. (2010). An ID-based ring signcryption scheme for wireless sensor networks. In IET International Conference on Wireless Sensor Network-IETWSN 2010 (pp. 368–373). Beijing, China. Qi, Z., Yang, G., Ren, X., & Li, Y. (2010). An ID-based ring signcryption scheme for wireless sensor networks. In IET International Conference on Wireless Sensor Network-IETWSN 2010 (pp. 368–373). Beijing, China.
27.
Zurück zum Zitat Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT Convergence and Security 2012, LNEE 215. Heidelberg: Springer. Sharma, G., Bala, S., & Verma, A. K. (2012). An identity-based ring signcryption scheme. In IT Convergence and Security 2012, LNEE 215. Heidelberg: Springer.
28.
Zurück zum Zitat Guo, Z., Li, M., & Fan, X. (2013). Attribute-based ring signcryption scheme. Security and Communication Networks, 6(6), 790–796. Guo, Z., Li, M., & Fan, X. (2013). Attribute-based ring signcryption scheme. Security and Communication Networks, 6(6), 790–796.
29.
Zurück zum Zitat Deng, L., Li, S., & Yu, Y. (2014). Identity-based threshold ring signcryption from pairing. International Journal of Electronic Security and Digital Forensics, 6(2), 90–103.CrossRef Deng, L., Li, S., & Yu, Y. (2014). Identity-based threshold ring signcryption from pairing. International Journal of Electronic Security and Digital Forensics, 6(2), 90–103.CrossRef
30.
Zurück zum Zitat An, J. H., Dodis, Y., & Rabin, T. (2002). On the security of joint signature and encryption. In Advances in Cryptology-EUROCRYPT 2002, LNCS 2332. Heidelberg: Springer. An, J. H., Dodis, Y., & Rabin, T. (2002). On the security of joint signature and encryption. In Advances in Cryptology-EUROCRYPT 2002, LNCS 2332. Heidelberg: Springer.
31.
Zurück zum Zitat Chow, S. S. M., Yiu, S. M., & Hui, L. C. K. (2005). Efficient identity based ring signature. In Applied Cryptography and Network Security-ACNS 2005, LNCS 3531. Heidelberg: Springer. Chow, S. S. M., Yiu, S. M., & Hui, L. C. K. (2005). Efficient identity based ring signature. In Applied Cryptography and Network Security-ACNS 2005, LNCS 3531. Heidelberg: Springer.
32.
Zurück zum Zitat Herranz, J., & Sáez, G. (2004). New identity-based ring signature schemes. In Information and Communications Security-ICICS 2004, LNCS 3269. Heidelberg: Springer. Herranz, J., & Sáez, G. (2004). New identity-based ring signature schemes. In Information and Communications Security-ICICS 2004, LNCS 3269. Heidelberg: Springer.
33.
Zurück zum Zitat Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, 11(1), 182–189.CrossRef Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, 11(1), 182–189.CrossRef
34.
Zurück zum Zitat Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems-CHES 2004, LNCS 3156. Heidelberg: Springer. Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems-CHES 2004, LNCS 3156. Heidelberg: Springer.
35.
Zurück zum Zitat Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications, 31(4), 659–667.CrossRef Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications, 31(4), 659–667.CrossRef
36.
Zurück zum Zitat Ma, C., Xue, K., & Hong, P. (2014). Distributed access control with adaptive privacy preserving property for wireless sensor networks. Security and Communication Networks, 7(4), 759–773.CrossRef Ma, C., Xue, K., & Hong, P. (2014). Distributed access control with adaptive privacy preserving property for wireless sensor networks. Security and Communication Networks, 7(4), 759–773.CrossRef
37.
Zurück zum Zitat Shim, K. A. (2014). \({\rm S}^{2}{\rm DRP}\): Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks, 19, 1–8.CrossRef Shim, K. A. (2014). \({\rm S}^{2}{\rm DRP}\): Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks, 19, 1–8.CrossRef
Metadaten
Titel
Secure and efficient data transmission in the Internet of Things
Publikationsdatum
01.05.2016
Erschienen in
Telecommunication Systems / Ausgabe 1/2016
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-015-0065-y

Weitere Artikel der Ausgabe 1/2016

Telecommunication Systems 1/2016 Zur Ausgabe

Neuer Inhalt