A Secure and Privacy Preserving Partial Deterministic RWP Model to Reduce Overlapping in IoT Sensing Environment

The idea of the Internet of Things (IoT) was developed in parallel to wireless sensor networks (WSNs). In a mobile WSN, a sensor node is generally assumed to move around randomly in direction and speed. Thus, a random waypoint is commonly used for node mobility modeling. Unfortunately, it does not consider the overlapping sensing coverage (OSC) at continuous moves or at a given time of sensor nodes. On top of this, there is no security mechanism to authenticate the sensor nodes and their privacy. Thus, results in a higher probability of occurring OSC in the network and the threats to the network through inside and outside attackers. To resolve these issues in 3D WSNs, this paper proposes a secure and privacy-preserving node mobility model that the nodes take part in periodic rounds securely. An ID-based authentication mechanism for joining nodes in the network and detection of the malicious node based on their survival strategies are proposed in the model. Moreover, the decision making of a next destination during a pause time in a round is three-folded. First, a set of member nodes are elected. Then, all nodes predict their prospective destinations randomly and the member nodes broadcast their prospective destinations’ information to neighbors. Finally, the neighborhood nodes adjust their prospective destinations considering the broadcasted information, in order to reduce the OSC in the network. The simulation experiments show that the proposed model reduces the OSC in the network and detects the malicious nodes, thus, results in a higher effective sensing coverage rate of the network in a secure way.

[1]  Xiaoguang Fan,et al.  A Clustering Routing Protocol for Mobile Ad Hoc Networks , 2016 .

[2]  Sarbani Roy,et al.  Multiple-sink placement strategies in wireless sensor networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[3]  Samira Moussaoui,et al.  Locating emergency responders using mobile wireless sensor networks , 2013, ISCRAM.

[4]  Gihwan Cho,et al.  An Energy Efficient Cluster Formation and Maintenance Scheme for Wireless Sensor Networks , 2012, J. Inform. and Commun. Convergence Engineering.

[5]  Xiang Li,et al.  Deploying Three-Dimensional Mobile Sensor Networks Based on Virtual Forces Algorithm , 2012, CWSN.

[6]  Jong-Tae Park,et al.  Mobile CoAP for IoT mobility management , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[7]  Mohammad Shahidehpour,et al.  Applications of wireless sensor networks for area coverage in microgrids , 2017 .

[8]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[9]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[10]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[11]  Fan Wu,et al.  Challenges of wireless sensor networks for Internet of thing applications , 2016, Int. J. Distributed Sens. Networks.

[12]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  Andrey Koucheryavy,et al.  Clustering Algorithm for 3D Wireless Mobile Sensor Network , 2015, NEW2AN.

[14]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.

[15]  Ainuddin Wahid Abdul Wahab,et al.  Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review , 2017, J. Sensors.

[16]  Nesrine Chakchouk,et al.  A Survey on Opportunistic Routing in Wireless Communication Networks , 2015, IEEE Communications Surveys & Tutorials.

[17]  B. Sudhakar,et al.  Multi Sink based Data Collection Scheme for Wireless Sensor Networks , 2014 .

[18]  Ping Wang,et al.  On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.

[19]  Antonio J. Jara,et al.  RPL-based networks in static and mobile environment: A performance assessment analysis , 2017, J. King Saud Univ. Comput. Inf. Sci..

[20]  Sami Kara,et al.  Methodology for Monitoring Manufacturing Environment by Using Wireless Sensor Networks (WSN) and the Internet of Things (IoT) , 2017 .

[21]  Asmae El Ghazi,et al.  Impact of Random Waypoint Mobility Model on Ant-based Routing Protocol for Wireless Sensor Networks , 2016, BDAW '16.

[22]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[23]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[24]  Nei Kato,et al.  A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.

[25]  Hossam S. Hassanein,et al.  Identifying Bounds on Sensing Coverage Holes in IoT Deployments , 2014, GLOBECOM 2014.