Secure Data Collection Scheme for Wireless Sensor Networks

被引:5
|
作者
Hwang, Ren Junn [1 ]
Huang, Yan Zhi [1 ]
机构
[1] TamKang Univ, Dept Comp Sci & Informat Engn, New Taipei, Taiwan
来源
2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017) | 2017年
关键词
authentication; secure data collection; wireless sensor network; Internet of Thing; USER AUTHENTICATION SCHEME;
D O I
10.1109/WAINA.2017.2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are extensively used in various industries and environments to monitor an environment and manage risks in situations such as real-time traffic monitoring and health care. The Internet of Thing (IOT) is a wireless sensor networks. Because a WSN is an open wireless communication network, it is vulnerable to security threats and attacks. It must authenticate its partner's identity and protect collection data to avoid eavesdropping or data destruction. This paper proposes a secure data collection scheme for WSNs. In this scheme, a collector, such as the pilotless plane, authenticates the identity of a smart card owner without a gateway node. Sensor nodes verify the collector, which is activated by an authorized smart card owner, and transmit data to the collector through a secure channel. The collector also authenticates whether the collected data are derived from valid sensor nodes. This design reduces communication cost and provides a secure channel to achieve data integrity and confidentiality; mutual authentication; and increased resistance to malicious insider attacks, password guessing attacks, and replay attacks.) The proposed scheme also can apply to the scenario of Internet of Thing to robust its security.
引用
收藏
页码:553 / 558
页数:6
相关论文
共 50 条
  • [41] A Secure Key Pre-distribution Scheme for Wireless Sensor Networks
    Liu, Ming
    Wei, Wei
    Liu, Zhihong
    ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 1753 - +
  • [42] Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks
    Roy, Sohini
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 368 - 380
  • [43] A new and secure authentication scheme for wireless sensor networks with formal proof
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Peer-to-Peer Networking and Applications, 2017, 10 : 16 - 30
  • [44] A secure and effective access control scheme for distributed wireless sensor networks
    Chatterjee, Santanu
    Das, Ashok Kumar
    Sing, Jamuna Kanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (01) : 40 - 73
  • [45] A new and secure authentication scheme for wireless sensor networks with formal proof
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 16 - 30
  • [46] A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2015, 15 (07) : 15127 - 15158
  • [47] A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks
    Lakshmi, V. S.
    Deepthi, P. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [48] Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    Yang, Haomiao
    Zhou, Boyang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 1129 - 1139
  • [49] Secure Data Aggregation with Fault Tolerance for Wireless Sensor Networks
    Annapurna, H. S.
    Siddappa, M.
    2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 29 - 33
  • [50] A LIGHTWEIGHT SECURE DATA AGGREGATION PROTOCOL FOR WIRELESS SENSOR NETWORKS
    Sun, Hung-Min
    Chen, Chiung-Hsun
    Li, Po-Chi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (10A): : 6503 - 6514