Lightweight Security Scheme for Internet of Things

The compressive sensing method presents itself as a promising technique in many fields specially for the Internet of Things and Wireless sensor networks applications. That is because, the compressive sensing has the major advantage of performing lightweight encryption and compression simultaneously. It leads to secure the network in addition to prolong the network life time. However, chosen plaintext attacks and key distribution are still major challenges facing the compressive sensing method. This paper focuses on the compressive sensing method according to security issue, and propose an efficient lightweight security scheme that addressee the previous challenges. Moreover, we use experimental data collected from a real sensors located in Intel Berkeley Research Lab.

[1]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[2]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[3]  Hong Sun,et al.  Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.

[4]  D. L. Donoho,et al.  Compressed sensing , 2006, IEEE Trans. Inf. Theory.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Yoram Bresler,et al.  Sub-Nyquist sampling of multiband signals: perfect reconstruction and bounds on aliasing error , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[7]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[8]  Deanna Needell,et al.  Uniform Uncertainty Principle and Signal Recovery via Regularized Orthogonal Matching Pursuit , 2007, Found. Comput. Math..

[9]  Zhiliang Zhu,et al.  A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[10]  Jun Sun,et al.  Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.

[11]  S. Mallat A wavelet tour of signal processing , 1998 .

[12]  Pavlos Charalampidis,et al.  Signal Processing Techniques for Energy Efficiency, Security, and Reliability in the IoT Domain , 2016 .

[13]  Enrico Zio,et al.  A Bayesian Optimal Design for Accelerated Degradation Testing Based on the Inverse Gaussian Process , 2017, IEEE Access.

[14]  Alexandros G. Fragkiadakis,et al.  Lightweight and secure encryption using channel measurements , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[15]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[16]  Richard G. Baraniuk,et al.  Compressive Sensing , 2008, Computer Vision, A Reference Guide.

[17]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[18]  Jean-Luc Starck,et al.  Sparse Solution of Underdetermined Systems of Linear Equations by Stagewise Orthogonal Matching Pursuit , 2012, IEEE Transactions on Information Theory.

[19]  Kwok-Wo Wong,et al.  Towards Secure Compressive Sampling Scheme , 2014, ArXiv.

[20]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.

[21]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[22]  Stefano Tubaro,et al.  Joint Compressive Video Coding and Analysis , 2010, IEEE Transactions on Multimedia.

[23]  Gill R. Tsouri,et al.  Establishing secure measurement matrix for compressed sensing using wireless physical layer security , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[24]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[25]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[26]  Luigi Palopoli,et al.  Scalable Offline Optimization of Industrial Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.

[27]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[28]  Alexandros G. Fragkiadakis,et al.  Enhancing compressive sensing encryption in constrained devices using chaotic sequences , 2016, SmartObjects '16.

[29]  Riccardo Rovatti,et al.  Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .