A Perturbed Compressed Sensing based Authentication Mechanism in Multi-hop Wireless Sensor Networks

The design of high efficient security mechanisms in resource constrained multi-hop Wireless Sensor Networks (WSNs) has always been a hot topic. Recently, compressed sensing (CS) has drawn great attentions for it can jointly compress and encrypt data with low energy cost and low computational and storage overhead. However, existing work only focuses on the data confidentiality rather than data authentication, integrity, etc. In order to achieve authentication and integrity without any extra communication overhead, this paper proposes a secure data transmission mechanism based on perturbed CS by introducing perturbations for authentication. We conduct extensive experiments to evaluate the performance of the proposed mechanism; the experimental results demonstrate the proposed secure mechanism can achieve authentication and integrity in multi-hop WSNs.

[1]  Jing Zhai,et al.  Study of Wireless Authentication Center with Mixed Encryption in WSN , 2016, J. Sensors.

[2]  Sen Bai,et al.  A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud , 2017, Inf. Sci..

[3]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[4]  Akram Aldroubi,et al.  Perturbations of measurement matrices and dictionaries in compressed sensing , 2012 .

[5]  Riccardo Rovatti,et al.  Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .

[6]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[7]  G. Sharma,et al.  On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[8]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[9]  Robert H. Deng,et al.  Practical ID-based encryption for wireless sensor network , 2010, ASIACCS '10.

[10]  Thomas Strohmer,et al.  General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.

[11]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[12]  Jun Sun,et al.  Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.

[13]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[14]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[15]  David K. Y. Yau,et al.  A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks , 2017, ACM Trans. Sens. Networks.

[16]  Xue Liu,et al.  Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[17]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[18]  Wenjun Zeng,et al.  A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework , 2014, IEEE Transactions on Image Processing.

[19]  Stefano Tubaro,et al.  A compressive-sensing based watermarking scheme for sparse image tampering identification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[20]  Cishen Zhang,et al.  Robustly Stable Signal Recovery in Compressed Sensing With Structured Matrix Perturbation , 2011, IEEE Transactions on Signal Processing.

[21]  Kun Liu,et al.  A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods , 2008, Privacy-Preserving Data Mining.

[22]  Liehuang Zhu,et al.  A Perturbed Compressed Sensing Protocol for Crowd Sensing , 2016, Mob. Inf. Syst..