Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

Wireless Sensor Networks (WSN) are naturally resource-constrained and have been deployed in various applications such as home monitoring, health care monitoring and military systems. These applications are connected to numerous devices capable of interacting with each other over the internet called as Internet of Things (IoT). WSN application plays a main part in the IoT environment. In WSN, sensors are randomly positioned in harsh surroundings where the communication network is facing privacy issues which is the most critical for data transmission. In this paper, we proposed a cryptographic based clustering structure for preserving data privacy using Optimal Privacy-Multihop Dynamic Clustering Routing Protocol (OP-MDCRP) that improves data privacy and energy efficient routing for the heterogeneous network which uses both clustering and multi-hop communication to reduce the energy consumption of sensor node and increases the lifetime of WSN. Based on the area, the source nodes are grouped to form a cluster in the random network. This scheme also provides high data privacy using Elliptic Curve Integrated Encryption-Key Provisioning Method (ECIES-KPM) along with small key size. Besides, data security based attacks are restricted by ECIES-KPM verification process. In this way, the sensitive data is confidentiality secured with low computational overhead. Experimental comparison shows that the evaluation of OP-MDCRP approach provides more data security than existing methods in terms of computational time, packet delivery ratio, energy consumption, average delay, network overhead and network lifetime.

[1]  Ruhul Amin,et al.  Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.

[2]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[3]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..

[4]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[5]  Deepak Puthal,et al.  Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks , 2017, IEEE Consumer Electronics Magazine.

[6]  V. P. Arunachalam,et al.  Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol , 2018, Future Gener. Comput. Syst..

[7]  Jian Shen,et al.  An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..

[8]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2017, IEEE Internet of Things Journal.

[9]  M. Yuvaraja,et al.  Fault detection and recovery scheme for routing and lifetime enhancement in WSN , 2015, Wireless Networks.

[10]  Khumanthem Manglem Singh,et al.  Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .

[11]  Athanasios V. Vasilakos,et al.  An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..

[12]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[13]  Ya-Fen Chang,et al.  An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks , 2017, J. Inf. Secur. Appl..

[14]  Feng Bao,et al.  Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..

[15]  Jaswinder Singh,et al.  Energy efficient secured routing protocol for MANETs , 2017, Wirel. Networks.

[16]  Ashok Kumar Das,et al.  A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[17]  Krishna Kant,et al.  LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks , 2015, Wireless Networks.

[18]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[20]  Jun Zhao,et al.  Topological Properties of Secure Wireless Sensor Networks Under the $q$ -Composite Key Predistribution Scheme With Unreliable Links , 2017, IEEE/ACM Transactions on Networking.

[21]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.