Skip to main content
Erschienen in: Wireless Personal Communications 1/2019

16.05.2019

Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment

verfasst von: Ming Luo, Yulang Wen, Xingtong Hu

Erschienen in: Wireless Personal Communications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks (WSNs) are foundation of Internet of things (IoT). Sensors are mainly deployed for collecting data which will be transmitted to IoT servers. In trying to prevent unauthorized users from stealing, faking even destroying data, it is critical to design a secure data transmission scheme for WSNs in the IoT. In recent years, a great many data transmission schemes have been put forward successively, however, most of these schemes required the sender and the receiver to be in the same network domain, or to share the same system parameters in different environments. Moreover, almost all of data transmission schemes cannot achieve known session-specific temporary information security (KSSTIS). For solving these problems, we proposed a data transmission scheme for WSNs in heterogeneous IoT environment by using heterogeneous ring signcryption. The data transmission scheme allows WSN node under the circumstance of certificateless cryptography (CLC) to transmit the collected data to an IoT server under the public key infrastructure (PKI) environment with different cryptographic system parameters. The proposed scheme which proves to be safe under the Computational Diffie-Hellman (CDH) problem in the random oracle model. Also, the proposed data transmission scheme is practical for wireless sensor networks in heterogeneous IoT environment through the efficiency analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yaqoob, I., Ahmed, E., Abaker, I., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3), 10–16.CrossRef Yaqoob, I., Ahmed, E., Abaker, I., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3), 10–16.CrossRef
3.
Zurück zum Zitat Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef
4.
Zurück zum Zitat Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.CrossRef Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.CrossRef
5.
Zurück zum Zitat Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.CrossRef Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.CrossRef
6.
Zurück zum Zitat Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA. (pp. 649–654). Taiwan, Taipei. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA. (pp. 649–654). Taiwan, Taipei.
7.
Zurück zum Zitat Sharma, G., Bala, S., & Verma, A. K. (2017). PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks. Wireless Personal Communications, 97(1), 1185–1196.CrossRef Sharma, G., Bala, S., & Verma, A. K. (2017). PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks. Wireless Personal Communications, 97(1), 1185–1196.CrossRef
8.
Zurück zum Zitat Khan, H. (2018). An identity based routing path verification scheme for wireless sensor networks. International Journal of Sensor Networks, 26(1), 1–15.CrossRef Khan, H. (2018). An identity based routing path verification scheme for wireless sensor networks. International Journal of Sensor Networks, 26(1), 1–15.CrossRef
9.
Zurück zum Zitat Zhu, H. F., Tan, Y. A., Zhu, L. H., et al. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1–15.CrossRef Zhu, H. F., Tan, Y. A., Zhu, L. H., et al. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1–15.CrossRef
10.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 452–473). Springer Berlin Heidelberg. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 452–473). Springer Berlin Heidelberg.
11.
Zurück zum Zitat Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC’07, (pp. 107–111). Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC’07, (pp. 107–111).
12.
Zurück zum Zitat Zhu, L.J., Zhang, F., & Miao, S. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES’10, (pp. 423–427). Zhu, L.J., Zhang, F., & Miao, S. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES’10, (pp. 423–427).
13.
Zurück zum Zitat Qi, Z. H., Yang, G., & Ren, X. Y. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106. Qi, Z. H., Yang, G., & Ren, X. Y. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106.
14.
Zurück zum Zitat Sharma, G., Bala, S., & Verma, A. K. (2015). Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks. Wireless Personal Communications, 84, 1469–1485.CrossRef Sharma, G., Bala, S., & Verma, A. K. (2015). Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks. Wireless Personal Communications, 84, 1469–1485.CrossRef
15.
Zurück zum Zitat Shen, H., Chen, J. H., He, D. B., & Shen, J. (2017). Insecurity of a pairing-free certificateless ring signcryption scheme. Wireless Personal Communications, 96, 5635–5641.CrossRef Shen, H., Chen, J. H., He, D. B., & Shen, J. (2017). Insecurity of a pairing-free certificateless ring signcryption scheme. Wireless Personal Communications, 96, 5635–5641.CrossRef
16.
Zurück zum Zitat Li, F., Zheng, Z., & Jin, C. (2016). Secure and efficient data transmission in the internet of things. Telecommunication Systems, 62(1), 111–122.CrossRef Li, F., Zheng, Z., & Jin, C. (2016). Secure and efficient data transmission in the internet of things. Telecommunication Systems, 62(1), 111–122.CrossRef
17.
Zurück zum Zitat Omala, A. A., Mbandu, A. S., Mutiria, K. D., Jin, C., & Li, F. (2018). Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 42(6), 1–14.CrossRef Omala, A. A., Mbandu, A. S., Mutiria, K. D., Jin, C., & Li, F. (2018). Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 42(6), 1–14.CrossRef
Metadaten
Titel
Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment
verfasst von
Ming Luo
Yulang Wen
Xingtong Hu
Publikationsdatum
16.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06576-8

Weitere Artikel der Ausgabe 1/2019

Wireless Personal Communications 1/2019 Zur Ausgabe