A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

[1]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[2]  Vaishali Sahare,et al.  Implementation of data confidentiality for providing high security in Wireless Sensor Network , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[3]  A. Benslimane,et al.  Analytical study of security aspects in 6LoWPAN networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).

[4]  Diane J. Cook,et al.  COM: A method for mining and monitoring human activity patterns in home-based health monitoring systems , 2013, ACM Trans. Intell. Syst. Technol..

[5]  Hans Dobbertin,et al.  Cryptanalysis of MD4 , 1996, Journal of Cryptology.

[6]  Houcine Chafouk,et al.  IKEv2 Authentication Exchange Model in NS-2 , 2014, 2014 International Symposium on Computer, Consumer and Control.

[7]  Jie Liu,et al.  Wellness Sensor Networks: A Proposal and Implementation for Smart Home for Assisted Living , 2015, IEEE Sensors Journal.

[8]  W. Dargie,et al.  Dynamic Power Management in Wireless Sensor Networks: State-of-the-Art , 2012, IEEE Sensors Journal.

[9]  Md. Iftekhar Hussain,et al.  A comparison of 802.11ah and 802.15.4 for IoT , 2016, ICT Express.

[10]  Howard M. Heys,et al.  FPGA implementation of MD5 hash algorithm , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).

[11]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[12]  John W. Lockwood,et al.  Dynamic hardware plugins in an FPGA with partial run-time reconfiguration , 2002, DAC '02.

[13]  Giancarlo Fortino,et al.  A WSN-Based Building Management Framework to Support Energy-Saving Applications in Buildings , 2012 .

[14]  Thiemo Voigt,et al.  Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .

[15]  Donghoon Chang,et al.  RC4-Hash: A New Hash Function Based on RC4 , 2006, INDOCRYPT.

[16]  Bhaskar Mondal,et al.  An Improved Cryptography Scheme for Secure Image Communication , 2013 .

[17]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[18]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[19]  John A. Stankovic,et al.  ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .

[20]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[21]  Subramaniam Shamala,et al.  Mobility management for IoT: a survey , 2016, EURASIP Journal on Wireless Communications and Networking.

[22]  Dipankar Raychaudhuri,et al.  A Mobile Phone Based WSN Infrastructure for IoT over Future Internet Architecture , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[23]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[24]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[25]  Lei Zhang,et al.  Wireless Sensor Networks and the Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[26]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[27]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[28]  Shanta Mandal A Secure Encryption Logic for Communication in Wireless Sensor Networks , 2012 .

[29]  Vasos Vassiliou,et al.  Inter-mobility support in controlled 6LoWPAN networks , 2010, 2010 IEEE Globecom Workshops.

[30]  P. Shanthi,et al.  Lightweight Security Algorithm For Wireless Node Connected with IoT , 2016 .

[31]  Franco Cicirelli,et al.  On the Design of Smart Homes: A Framework for Activity Recognition in Home Environment , 2016, Journal of Medical Systems.

[32]  Sana Hoor Jokhio,et al.  Light-weight framework for security-sensitive wireless sensor networks applications , 2013, IET Wirel. Sens. Syst..

[33]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[34]  Jessye Dos Santos,et al.  Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.

[35]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[36]  Zhou Ning,et al.  FPGA implementation of SHA-1 algorithm , 2003, ASICON 2003.

[37]  Subhas Chandra Mukhopadhyay,et al.  Internet of Things for smart homes and buildings , 2015 .

[38]  Michel Auguin,et al.  A Joint Duty-Cycle and Transmission Power Management for Energy Harvesting WSN , 2014, IEEE Transactions on Industrial Informatics.

[39]  Mohsen Guizani,et al.  Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.