A mobile-device-based event reporting scheme for WSNs

In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is a mobile-device-based event reporting scheme. In an environmental monitoring system since there are some events (such as structural damage to dams and bridges) that cannot be reported automatically, we propose using a mobile device to report such events. The proposed scheme can defend against Denial of Service (DoS) and man-in-the-middle attacks, achieve mutual authentication, ensure data security and address network security issues.

[1]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[2]  Sungyoung Lee,et al.  A coordination-based data dissemination protocol for wireless sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..

[3]  Young-Koo Lee,et al.  Secured WSN-integrated cloud computing for u-Life Care , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[4]  Haiyun Luo,et al.  A two-tier data dissemination model for large-scale wireless sensor networks , 2002, MobiCom '02.

[5]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[6]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[7]  Sheetal Kalra,et al.  Advanced password based authentication scheme for wireless sensor networks , 2015, J. Inf. Secur. Appl..

[8]  Jan M. Rabaey,et al.  PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.

[9]  Yanghee Choi,et al.  SAFE: a data dissemination protocol for periodic updates in sensor networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[10]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[11]  Cheng-Chi Lee,et al.  A spare two-tier data aggregation for grid-based wireless sensor networks , 2010, IWCMC.

[12]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[13]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.