Skip to main content
Log in

Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

A massive amount of data is generated in today's modern era. The world's open and interconnected nature puts this data and its privacy at constant risk. As a result, establishing a secure data exchange mechanism for large datasets in cyberspace is an extremely difficult task. To address this issue, several architectures already exist that include a safe and reliable data exchange algorithm. The focus of this research lies in the development of a Wireless Sensor Network (WSN) system that fosters secure data sharing. To achieve this, an intelligent security model that supports the WSN security measures is designed. This research assesses the performance of network security and economic incentives, while exploring alternative deployment strategies. The evaluation encompasses criteria such as design of network architecture, secure authentication, and key management including randomness, hardness, and successful key reconciliation. The main goal of this proposed scheme is to design a more secure and authentic security framework to handle large amounts of data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Yin H, Guo D, Wang K, Jiang Z, Lyu Y, Xing J (2018) Hyperconnected network: A decentralized trusted computing and networking paradigm. IEEE Network 32(1):112–117

    Article  Google Scholar 

  2. Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Network 32(4):8–14

    Article  Google Scholar 

  3. Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 24(5):14757–14767

    Article  Google Scholar 

  4. Chajed T, Gjengset J, Van Den Hooff J, Kaashoek MF, Mickens J, Morris R, Zeldovich N (2015) Amber: Decoupling user data from web applications. In: 15th workshop on hot topics in operating systems (HotOS XV)

  5. De Montjoye YA, Shmueli E, Wang SS, Pentland AS (2014) openpds: Protecting the privacy of metadata through safeanswers. PLoS ONE 9(7):e98790

    Article  Google Scholar 

  6. Majeed A, Hwang SO (2023) When AI meets information privacy: the adversarial role of AI in data sharing scenario. IEEE Access

  7. Salau BA, Rawal A, Rawat DB (2022) Recent advances in artificial intelligence for wireless internet of things and cyber–physical systems: A comprehensive survey. IEEE Internet Things J 9(15):12916–12930

    Article  Google Scholar 

  8. Dorri A, Steger M, Kanhere SS, Jurdak R (2017) Blockchain: A distributed solution to automotive security and privacy. IEEE Commun Mag 55(12):119–125

    Article  Google Scholar 

  9. Wang J, Li M, He Y, Li H, Xiao K, Wang C (2018) A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545–17556

    Article  Google Scholar 

  10. DE Wylde V et al (2022) The use of AI in managing big data analysis demands: status and future directions. Artific Intellig Nat Secur 47–67

  11. Halevy A, Norvig P, Pereira F (2009) The unreasonable effectiveness of data. IEEE Intell Syst 24(2):8–12

    Article  Google Scholar 

  12. Altun U, Basaran ST, Kurt GK, Ozdemir E (2022) Scalable secret key generation for wireless sensor networks. IEEE Syst J 16(4):6031–6041

    Article  Google Scholar 

  13. Wang F, Li G, Wang Y, Rafique W, Khosravi MR, Liu G, Liu Y, Qi L (2023) Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city. ACM Trans Internet Technol 23(3):1–9

    Google Scholar 

  14. Alhazmi HE, Eassa FE, Sandokji SM (2022) Towards big data security framework by leveraging fragmentation and blockchain technology. IEEE Access 10:10768–10782

    Article  Google Scholar 

  15. Latif SA, Wen FB, Iwendi C, Li-Li FW, Mohsin SM, Han Z, Band SS (2022) AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput Commun 181:274–283

    Article  Google Scholar 

  16. Fernández M, Jaimunk J, Thuraisingham B (2022) A privacy-preserving architecture and data-sharing model for cloud-IoT applications. IEEE Trans Depend Sec Comput

  17. Jia C, Ding H, Zhang C, Zhang X (2021) Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alex Eng J 60(1):337–346

    Article  Google Scholar 

  18. Naresh VS, Allavarpu VD, Reddi S (2022) Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN. J Supercomp 1–25

  19. Fang W, Zhang W, Chen W, Pan T, Ni Y, Yang Y (2020) Trust-based attack and defense in wireless sensor networks: a survey. Wirel Commun Mob Comput 2020:1–20

    Article  Google Scholar 

  20. Lu Q, Xu X (2017) Adaptable blockchain-based systems: a case study for product traceability. IEEE Softw 34(6):21–27

    Article  Google Scholar 

  21. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Infor 14(4):1656–1665

    Article  Google Scholar 

  22. Xuelian C et al (2023) An incentive mechanism for vehicular crowdsensing with security protection and data quality assurance. IEEE Trans Veh Technol

  23. Nandini S, Kempanna M (2022) Lifetime aware secure data aggregation through integrated incentive-based mechanism in IoT-based WSN environment. In: Congress on intelligent systems: proceedings of CIS 2021, vol 2. Springer Nature, Singapore

  24. Srivastava A, Gupta J (2023) Attack resistant blockchain-based healthcare record system using modified RSA Algorithm. Int J Inf Technol 6:1–8

    Google Scholar 

  25. Faris M et al (2023) Wireless sensor network security: a recent review based on state-of-the-art works. Int J Eng Bus Manag 15:18479790231157220

    Article  Google Scholar 

  26. Pooja G, Naveen H (2013) Security issues in wireless sensor network: a review. Int J Eng Sci Res Technol 2(5):342–350

    Google Scholar 

  27. Meena N, Singh B (2023) An efficient coverage and connectivity maintenance using optimal adaptive learning in WSNs. Int J Inf Technol 15(8):4491–4504

    Google Scholar 

  28. Gautam AK, Kumar R (2021) A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl Sci 3(1):50

    Article  MathSciNet  Google Scholar 

  29. Cui Z et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transact Serv Comput 13(2):241–251

    Google Scholar 

  30. Simpson SV, Ravi Raju Y, Bhanu Rajesh Naidu K, Venu G (2023) SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks. Int J Inf Technol 15(8):4323–4336

    Google Scholar 

  31. Singhal D, Ahuja L, Seth A (2023) POSMETER: proof-of-stake blockchain for enhanced smart meter data security. Int J Inf Technol 17:1–4

    Google Scholar 

  32. Mishra AK, Mohapatra Y (2023) Hybrid blockchain based medical data sharing with the optimized CP-ABE for e-Health systems. Int J Inf Technol 9:1

    Google Scholar 

  33. Nithya B (2020) Cluster based key management schemes in wireless sensor networks: a survey. Proc Comput Sci 171:2684–2693

    Article  Google Scholar 

  34. Hsiao S-J, Wen-Tsai S (2021) Employing blockchain technology to strengthen security of wireless sensor networks. IEEE Access 9:72326–72341

    Article  Google Scholar 

  35. Moara-Nkwe Kemedi et al (2018) A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6:11374–11387

    Article  Google Scholar 

  36. Vasala U, Sakthidharan GR (2017) Effective key management in dynamic wireless sensor networks. Int J Comput Eng Res Trends 4(7):308–312

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Devi.

Ethics declarations

Conflict of interests

The authors declare they have no financial and competing interests.

Consent for publication

This research adheres to the principles that matter enclosed in this article is original and not submitted anywhere for publication.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, S., Kumar, A. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation. Int. j. inf. tecnol. 16, 3325–3336 (2024). https://doi.org/10.1007/s41870-024-01879-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-024-01879-x

Keywords

Navigation