Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment

Wireless Sensor Networks (WSNs) are foundation of Internet of things (IoT). Sensors are mainly deployed for collecting data which will be transmitted to IoT servers. In trying to prevent unauthorized users from stealing, faking even destroying data, it is critical to design a secure data transmission scheme for WSNs in the IoT. In recent years, a great many data transmission schemes have been put forward successively, however, most of these schemes required the sender and the receiver to be in the same network domain, or to share the same system parameters in different environments. Moreover, almost all of data transmission schemes cannot achieve known session-specific temporary information security (KSSTIS). For solving these problems, we proposed a data transmission scheme for WSNs in heterogeneous IoT environment by using heterogeneous ring signcryption. The data transmission scheme allows WSN node under the circumstance of certificateless cryptography (CLC) to transmit the collected data to an IoT server under the public key infrastructure (PKI) environment with different cryptographic system parameters. The proposed scheme which proves to be safe under the Computational Diffie-Hellman (CDH) problem in the random oracle model. Also, the proposed data transmission scheme is practical for wireless sensor networks in heterogeneous IoT environment through the efficiency analysis.

[1]  Chunguang Ma,et al.  A Secure Ring Signcryption Scheme for Private and Anonymous Communication , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[2]  Gilwon Yoon,et al.  Analysis of Biosignals During Immersion in Computer Games , 2017, Journal of Medical Systems.

[3]  Hyungmin Kim,et al.  An Implantable Wireless Neural Interface System for Simultaneous Recording and Stimulation of Peripheral Nerve with a Single Cuff Electrode , 2017, Sensors.

[4]  Chunhua Jin,et al.  Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.

[5]  Haibat Khan An identity based routing path verification scheme for wireless sensor networks , 2018, Int. J. Sens. Networks.

[6]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[7]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[8]  Gaurav Sharma,et al.  PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[9]  Yi Luo,et al.  Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT , 2018, Secur. Commun. Networks.

[10]  Xiaodong Liu,et al.  CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks , 2018, Int. J. Sens. Networks.

[11]  Futai Zhang,et al.  A Provably Secure Parallel Certificatelesss Ring Signcryption Scheme , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[12]  Liehuang Zhu,et al.  An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.

[13]  Jian Shen,et al.  Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme , 2017, Wirel. Pers. Commun..

[14]  Yi Mu,et al.  Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[15]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[16]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[17]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[18]  Gaurav Sharma,et al.  Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[19]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[20]  Chunhua Jin,et al.  Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.