Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment

被引:18
作者
Luo, Ming [1 ]
Wen, Yulang [1 ]
Hu, Xingtong [1 ]
机构
[1] Nanchang Univ, Sch Software, Nanchang 330000, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; Certificateless; Different system parameters; Signcryption; KSSTIS; THINGS SECURITY; INTERNET;
D O I
10.1007/s11277-019-06576-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless Sensor Networks (WSNs) are foundation of Internet of things (IoT). Sensors are mainly deployed for collecting data which will be transmitted to IoT servers. In trying to prevent unauthorized users from stealing, faking even destroying data, it is critical to design a secure data transmission scheme for WSNs in the IoT. In recent years, a great many data transmission schemes have been put forward successively, however, most of these schemes required the sender and the receiver to be in the same network domain, or to share the same system parameters in different environments. Moreover, almost all of data transmission schemes cannot achieve known session-specific temporary information security (KSSTIS). For solving these problems, we proposed a data transmission scheme for WSNs in heterogeneous IoT environment by using heterogeneous ring signcryption. The data transmission scheme allows WSN node under the circumstance of certificateless cryptography (CLC) to transmit the collected data to an IoT server under the public key infrastructure (PKI) environment with different cryptographic system parameters. The proposed scheme which proves to be safe under the Computational Diffie-Hellman (CDH) problem in the random oracle model. Also, the proposed data transmission scheme is practical for wireless sensor networks in heterogeneous IoT environment through the efficiency analysis.
引用
收藏
页码:505 / 519
页数:15
相关论文
共 18 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Internet of Things security and forensics: Challenges and opportunities
    Conti, Mauro
    Dehghantanha, Ali
    Franke, Katrin
    Watson, Steve
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 544 - 546
  • [3] Huang XY, 2005, AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, P649
  • [5] Internet of things security: A top-down survey
    Kouicem, Djamel Eddine
    Bouabdallah, Abdelmadjid
    Lakhlef, Hicham
    [J]. COMPUTER NETWORKS, 2018, 141 : 199 - 221
  • [6] Secure and efficient data transmission in the Internet of Things
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    [J]. TELECOMMUNICATION SYSTEMS, 2016, 62 (01) : 111 - 122
  • [7] A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
    Lin, Jie
    Yu, Wei
    Zhang, Nan
    Yang, Xinyu
    Zhang, Hanlin
    Zhao, Wei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1125 - 1142
  • [8] Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
    Luo, Ming
    Luo, Yi
    Wan, Yuwei
    Wang, Ze
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network
    Omala, Anyembe Andrew
    Mbandu, Angolo Shem
    Mutiria, Kamenyi Domenic
    Jin, Chunhua
    Li, Fagen
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (06)
  • [10] Qi ZH, 2011, CHINA COMMUN, V8, P99