SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.

[1]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[2]  Mario Huemer,et al.  Digitally-intensive transceivers for future mobile communications—emerging trends and challenges , 2018, Elektrotech. Informationstechnik.

[3]  Younghan Kim,et al.  An Efficient Interactive Model for On-Demand Sensing-As-A-Servicesof Sensor-Cloud , 2016, Sensors.

[4]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[5]  Mohsen Guizani,et al.  Cloud of Things for Sensing-as-a-Service: Architecture, Algorithms, and Use Case , 2016, IEEE Internet of Things Journal.

[6]  Neelam Srivastava,et al.  WIRELESS SENSOR NETWORKS IN AGRICULTURE: FOR POTATO FARMING , 2010 .

[7]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[8]  Vijay H. Mankar,et al.  Text Encryption Algorithms based on Pseudo Random Number Generator , 2015 .

[9]  Ainuddin Wahid Abdul Wahab,et al.  Energy harvesting and battery power based routing in wireless sensor networks , 2017, Wirel. Networks.

[10]  Nidal Nasser,et al.  Secure Multipath Routing Protocol for Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[11]  Mohsen Guizani,et al.  RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things , 2019, IEEE Access.

[12]  Byung-Seo Kim,et al.  The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.

[13]  Bruce Schneier,et al.  Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.

[14]  Song Guo,et al.  Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.

[15]  Qiang Liu,et al.  A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture , 2018, IEEE Access.

[16]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[17]  Khalid A. Darabkh,et al.  Improved clustering algorithms for target tracking in wireless sensor networks , 2017, The Journal of Supercomputing.

[18]  Mohsen Guizani,et al.  Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring , 2017, IEEE Wireless Communications.

[19]  Nikos A. Vlassis,et al.  The global k-means clustering algorithm , 2003, Pattern Recognit..

[20]  Salwani Abdullah,et al.  Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks , 2018, IEEE Access.

[21]  Ahmed Serhrouchni,et al.  A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[22]  Xiaohui Yuan,et al.  A Genetic Algorithm-Based, Dynamic Clustering Method Towards Improved WSN Longevity , 2016, Journal of Network and Systems Management.

[23]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2018, Cluster Computing.

[24]  Kakali Chatterjee,et al.  A Secure and Efficient Authentication Protocol in Wireless Sensor Network , 2015, Wirel. Pers. Commun..

[25]  Dan Tian,et al.  LEACH-Based Security Routing Protocol for WSNs , 2012 .

[26]  Yashwant Prasad Singh,et al.  Topology-controlled adaptive clustering for uniformity and increased lifetime in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[27]  Jiannong Cao,et al.  QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[28]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[29]  Ahmad Ali,et al.  A Comprehensive Survey on Real-Time Applications of WSN , 2017, Future Internet.

[30]  Ramesh Chandra Joshi,et al.  A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks , 2010, IC3.

[31]  Michel Kadoch,et al.  Performance Improvement of Cluster-Based Routing Protocol in VANET , 2017, IEEE Access.

[32]  B. S. Sohi,et al.  An Optimal Tree-Based Routing Protocol Using Particle Swarm Optimization , 2018 .

[33]  Daniele Tarchi,et al.  Gateway selection and clustering in multi-interface wireless mesh networks considering network reliability and traffic , 2018, Trans. Emerg. Telecommun. Technol..

[34]  Gautam M. Borkar,et al.  A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks , 2017, Wirel. Networks.

[35]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[36]  Mohammed Abo-Zahhad,et al.  A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions , 2017, Wirel. Commun. Mob. Comput..

[37]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .

[38]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[39]  Victor C. M. Leung,et al.  Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.

[40]  Jamil Y. Khan,et al.  An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications , 2017, 2017 IEEE International Conference on Communications (ICC).

[41]  Victor C. M. Leung,et al.  Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.

[42]  Mohsen Guizani,et al.  Machine learning in the Internet of Things: Designed techniques for smart cities , 2019, Future Gener. Comput. Syst..

[43]  Springer Fachmedien Wiesbaden Constantly reliable tools , 2017 .

[44]  M. Shamim Hossain,et al.  A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.

[45]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[46]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[47]  Mohsen Guizani,et al.  StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks , 2020, IEEE Access.

[48]  Baoyu Zheng,et al.  Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.

[49]  Nadra Guizani,et al.  Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.

[50]  Naveed Islam,et al.  An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN , 2019, Energies.

[51]  Younghan Kim,et al.  An Efficient On-Demand Latency Guaranteed Interactive Model for Sensor-Cloud , 2018, IEEE Access.

[52]  Ikram Ud Din,et al.  Energy-Effective Cooperative and Reliable Delivery Routing Protocols for Underwater Wireless Sensor Networks , 2019, Energies.

[53]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[54]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[55]  Ikram Ud Din,et al.  Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things , 2019, IEEE Access.

[56]  Tae Ho Cho,et al.  An Energy-Aware Routing and Filtering Node (ERF) Selection in CCEF to Extend Network Lifetime in WSN , 2017 .

[57]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[58]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[59]  Sanjay Kumar Madria,et al.  Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.

[60]  Ting Zhang,et al.  Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education , 2017, J. Netw. Comput. Appl..

[61]  Mohsen Guizani,et al.  HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things , 2019, IEEE Access.

[62]  Muhammad Faheem,et al.  Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0 , 2017, Appl. Soft Comput..

[63]  George Suciu,et al.  Big Data, Internet of Things and Cloud Convergence – An Architecture for Secure E-Health Applications , 2015, Journal of Medical Systems.

[64]  Muhammad Khurram Khan,et al.  Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities , 2019, Comput. Sci. Inf. Syst..

[65]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).