Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

26.10.2018

Lightweight Security Scheme for Internet of Things

verfasst von: Ahmed Aziz, Karan Singh

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The compressive sensing method presents itself as a promising technique in many fields specially for the Internet of Things and Wireless sensor networks applications. That is because, the compressive sensing has the major advantage of performing lightweight encryption and compression simultaneously. It leads to secure the network in addition to prolong the network life time. However, chosen plaintext attacks and key distribution are still major challenges facing the compressive sensing method. This paper focuses on the compressive sensing method according to security issue, and propose an efficient lightweight security scheme that addressee the previous challenges. Moreover, we use experimental data collected from a real sensors located in Intel Berkeley Research Lab.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A. K., Leppakoski, H., et al. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5(99), 1. Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A. K., Leppakoski, H., et al. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5(99), 1.
2.
Zurück zum Zitat Palopoli, L., Passerone, R., & Rizano, T. (2011). Scalable offline optimization of industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 7(2), 328–329.CrossRef Palopoli, L., Passerone, R., & Rizano, T. (2011). Scalable offline optimization of industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 7(2), 328–329.CrossRef
3.
Zurück zum Zitat Mollin, R. A. (2006). An introduction to cryptography. Boca Raton: CRC Press.MATH Mollin, R. A. (2006). An introduction to cryptography. Boca Raton: CRC Press.MATH
4.
Zurück zum Zitat Vanstone, S. A., Menezes, A. J., & Oorschot, P. C. (1999). Handbook of applied cryptography. Boca Raton: CRC Press.MATH Vanstone, S. A., Menezes, A. J., & Oorschot, P. C. (1999). Handbook of applied cryptography. Boca Raton: CRC Press.MATH
5.
Zurück zum Zitat Fragkiadakis, A., Tragos, E., & Traganitis, A. (2014). Lightweight and secure encryption using channel measurements. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace, Aalborg (pp. 1–5). Fragkiadakis, A., Tragos, E., & Traganitis, A. (2014). Lightweight and secure encryption using channel measurements. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace, Aalborg (pp. 1–5).
7.
Zurück zum Zitat Candes, E. J., & Tao, T. (2006). Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Transactions on Information Theory, 52(12), 5406–5425.MathSciNetCrossRefMATH Candes, E. J., & Tao, T. (2006). Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Transactions on Information Theory, 52(12), 5406–5425.MathSciNetCrossRefMATH
8.
Zurück zum Zitat Cossalter, M., Valenzise, G., Tagliasacchi, M., & Tubaro, S. (2010). Joint compressive video coding and analysis. IEEE Transactions on Multimedia, 12(3), 168183.CrossRef Cossalter, M., Valenzise, G., Tagliasacchi, M., & Tubaro, S. (2010). Joint compressive video coding and analysis. IEEE Transactions on Multimedia, 12(3), 168183.CrossRef
9.
Zurück zum Zitat Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.CrossRef Premnath, S., Jana, S., Croft, J., Gowda, P., Clark, M., Kasera, S., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.CrossRef
10.
Zurück zum Zitat Li, Z., Xu, W., Miller, R., & Trappe, W. (2006). Securing wireless systems via lower layer enforcements, In Proceedings of the WiSe (pp. 33–42). Li, Z., Xu, W., Miller, R., & Trappe, W. (2006). Securing wireless systems via lower layer enforcements, In Proceedings of the WiSe (pp. 33–42).
11.
Zurück zum Zitat Dautov, R., & Tsouri, G. (2013). Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In Proceedings of ICNC (pp. 354–358). Dautov, R., & Tsouri, G. (2013). Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In Proceedings of ICNC (pp. 354–358).
12.
Zurück zum Zitat Fragkiadakis, L., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., & Surligas, M. (2016). Signal processing techniques for energy efficiency, security, and reliability in the IoT domain (pp. 19–447). New York: Springer. Fragkiadakis, L., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., & Surligas, M. (2016). Signal processing techniques for energy efficiency, security, and reliability in the IoT domain (pp. 19–447). New York: Springer.
13.
Zurück zum Zitat Rachlin, Y., & Baron, D. (2008). The secrecy of compressed sensing measurements. In Proceedings of 46th annual Allerton conference on communication, control, and computing (pp. 813–817). Rachlin, Y., & Baron, D. (2008). The secrecy of compressed sensing measurements. In Proceedings of 46th annual Allerton conference on communication, control, and computing (pp. 813–817).
14.
Zurück zum Zitat Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., & Setti, G. (2015). Low-complexity multiclass encryption by compressed sensing. IEEE Transactions on Signal Processing, 63, 21832195.MathSciNetMATH Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., & Setti, G. (2015). Low-complexity multiclass encryption by compressed sensing. IEEE Transactions on Signal Processing, 63, 21832195.MathSciNetMATH
15.
Zurück zum Zitat Yu, L., Barbot, J. P., Zheng, G., & Sun, H. (2010). Compressive sensing with chaotic sequence. IEEE Signal Processing Letters, 17(8), 731734. Yu, L., Barbot, J. P., Zheng, G., & Sun, H. (2010). Compressive sensing with chaotic sequence. IEEE Signal Processing Letters, 17(8), 731734.
16.
Zurück zum Zitat Zhang, L., Wong, K., Li, C., & Zhang, Y. (2014). Towards secure compressive sampling scheme. CoRR. Zhang, L., Wong, K., Li, C., & Zhang, Y. (2014). Towards secure compressive sampling scheme. CoRR.
17.
Zurück zum Zitat Fragkiadakis, A., Kovacevic, L., & Tragos, E. (2016). Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In Proceedings of the 2nd workshop on experiences in the design and implementation of smart objects (pp. 17–22). Fragkiadakis, A., Kovacevic, L., & Tragos, E. (2016). Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In Proceedings of the 2nd workshop on experiences in the design and implementation of smart objects (pp. 17–22).
18.
Zurück zum Zitat Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A novel image encryption algorithm based on improved 3D Chaotic Cat Map. In The 9th international conference for young computer scientists. Liu, H., Zhu, Z., Jiang, H., & Wang, B. (2008). A novel image encryption algorithm based on improved 3D Chaotic Cat Map. In The 9th international conference for young computer scientists.
19.
Zurück zum Zitat Candes, E., & Tao, T. (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, 52(52), 145–156.MathSciNetMATH Candes, E., & Tao, T. (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, 52(52), 145–156.MathSciNetMATH
20.
Zurück zum Zitat Baraniuk, R. G. (2007). Compressive sensing. IEEE Signal Processing Magazine, 24(4), 118–121.CrossRef Baraniuk, R. G. (2007). Compressive sensing. IEEE Signal Processing Magazine, 24(4), 118–121.CrossRef
21.
Zurück zum Zitat Mallat, S. (1999). A wavelet tour of signal processing. Cambridge: Academic Press.MATH Mallat, S. (1999). A wavelet tour of signal processing. Cambridge: Academic Press.MATH
22.
Zurück zum Zitat Venkataramani, R., & Bresler, Y. (1998). Sub-nyquist sampling of multiband signals: Perfect reconstruction and bounds on aliasing error. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 12–15). Venkataramani, R., & Bresler, Y. (1998). Sub-nyquist sampling of multiband signals: Perfect reconstruction and bounds on aliasing error. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 12–15).
23.
Zurück zum Zitat Tropp, J., & Gilber, A. (2007). Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(14), 4655–4666.MathSciNetCrossRefMATH Tropp, J., & Gilber, A. (2007). Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(14), 4655–4666.MathSciNetCrossRefMATH
24.
Zurück zum Zitat Donoho, D., Yaakov, T., Drori, I., & Jean, S. (2012). Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Transactions on Information Theory, 58(2), 1094–1121.MathSciNetCrossRefMATH Donoho, D., Yaakov, T., Drori, I., & Jean, S. (2012). Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Transactions on Information Theory, 58(2), 1094–1121.MathSciNetCrossRefMATH
25.
Zurück zum Zitat Deanna, N., & Roman, V. (2009). Uniform uncertainty principle and signal recovery via regularized orthogonal matching pursuit. Foundations of Computational Mathematics, 9(3), 317–334.MathSciNetCrossRefMATH Deanna, N., & Roman, V. (2009). Uniform uncertainty principle and signal recovery via regularized orthogonal matching pursuit. Foundations of Computational Mathematics, 9(3), 317–334.MathSciNetCrossRefMATH
26.
Zurück zum Zitat Luo, C., Wu, F., Sun, J., & Chen, C. W.(2009). Compressive data gathering for large-scale wireless sensor networks. In Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom 09 (pp. 145–156), New York, NY, USA. Luo, C., Wu, F., Sun, J., & Chen, C. W.(2009). Compressive data gathering for large-scale wireless sensor networks. In Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom 09 (pp. 145–156), New York, NY, USA.
27.
Zurück zum Zitat Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference (pp. 3005–3014). Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference (pp. 3005–3014).
Metadaten
Titel
Lightweight Security Scheme for Internet of Things
verfasst von
Ahmed Aziz
Karan Singh
Publikationsdatum
26.10.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6035-4

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt