Enabling end-to-end secure communication between wireless sensor networks and the Internet

被引:0
作者
Hong Yu
Jingsha He
Ting Zhang
Peng Xiao
Yuqiang Zhang
机构
[1] Beijing University of Technology,College of Computer Science and Technology
[2] Beijing University of Technology,School of Software Engineering
来源
World Wide Web | 2013年 / 16卷
关键词
Internet of things (IoT); web of things (WoT); wisdom web of things (W2T); wireless sensor networks (WSNs); security;
D O I
暂无
中图分类号
学科分类号
摘要
In the paradigms of the Internet of Things (IoT) as well as the evolving Web of Things (WoT) and the emerging Wisdom Web of Things (W2T), not only can the data collected by the sensor nodes (i.e., the things) in the wireless sensor networks (WSNs) be transmitted to and processed at Internet nodes and subsequently transformed into information, knowledge, wisdom and eventually into services to serve humans, but human users can also access, control and manage the sensor nodes in the WSNs through nodes in the Internet. Since data are the basis for enabling applications and services in W2T, it becomes imperative that enabling technologies for end-to-end security be developed to secure data communication between Internet user nodes and sensor server nodes to protect the exchange of data. However, traditional security protocols developed for the Internet rely mostly on symmetric authentication and key management based on public key algorithms, thus are deemed to be unsuitable for WSNs due to resource constraints in the sensor nodes. Specifically, acting as the server nodes in this scenario, sensor nodes cannot take on the heavy duty like regular servers in the Internet. Meanwhile, current security mechanisms developed for WSNs have mainly focused on the establishment of keys between neighboring nodes at the link layer and thus are not considered to be effective for end-to-end security in the W2T scenario. In this paper, we propose an end-to-end secure communication scheme for W2T in WSNs in which we follow an asymmetric approach for authentication and key management using signcryption and symmetric key encryption. In our proposed scheme, a great part of the work for authentication and access control is shifted to a gateway between a WSN and the Internet to reduce the burden and energy consumption in the sensor nodes. In addition, our scheme can ensure the privacy of user identities and key negotiation materials, and denial of service (DoS) attacks targeted at the sensor nodes can be effectively blocked at the gateway. We will also conduct quantitative analysis and an experiment to show that our proposed scheme can enhance the effectiveness of end-to-end security while reducing the cost of sensor nodes in terms of computation, communication and storage overhead as well as the latency of handshaking compared to similar schemes that are based on Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
引用
收藏
页码:515 / 540
页数:25
相关论文
共 23 条
[1]  
Atzori L(2010)The internet of things: a survey Comput. Netw. 54 2787-2805
[2]  
Iera A(2009)Identity-based anonymous remote authentication for value-added services in mobile networks IEEE Trans. Veh. Technol. 58 3508-3517
[3]  
Morabito G(2008)IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks Comput. Commun. 31 659-667
[4]  
Cao X(2011)The web of things vision: things as a service and interaction patterns Bell Labs. Tech. J. 16 55-62
[5]  
Kou W(2005)A pairwise key predistribution scheme for wireless sensor networks ACM Trans. Inf. Syst. Secur. 8 228-258
[6]  
Zeng X(2007)The effects of XML compression on SOAP performance World Wide Web 10 279-307
[7]  
Dang L(2005)Establishing pairwise keys in distributed sensor networks ACM Trans. Inf. Syst. Secur. 8 41-77
[8]  
Cao X(2008)A unified security framework with three key management schemes for wireless sensor networks Comput. Commun. 31 4269-4280
[9]  
Christophe B(2011)Key management systems for sensor networks in the context of the internet of things Comput. Electr. Eng. 37 147-159
[10]  
Du W(2012)Trust-based mutual authentication for bootstrapping in 6LoWPAN J. Commun. Technol. 7 634-642