Abstract
A massive amount of data is generated in today's modern era. The world's open and interconnected nature puts this data and its privacy at constant risk. As a result, establishing a secure data exchange mechanism for large datasets in cyberspace is an extremely difficult task. To address this issue, several architectures already exist that include a safe and reliable data exchange algorithm. The focus of this research lies in the development of a Wireless Sensor Network (WSN) system that fosters secure data sharing. To achieve this, an intelligent security model that supports the WSN security measures is designed. This research assesses the performance of network security and economic incentives, while exploring alternative deployment strategies. The evaluation encompasses criteria such as design of network architecture, secure authentication, and key management including randomness, hardness, and successful key reconciliation. The main goal of this proposed scheme is to design a more secure and authentic security framework to handle large amounts of data.
Similar content being viewed by others
References
Yin H, Guo D, Wang K, Jiang Z, Lyu Y, Xing J (2018) Hyperconnected network: A decentralized trusted computing and networking paradigm. IEEE Network 32(1):112–117
Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Network 32(4):8–14
Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 24(5):14757–14767
Chajed T, Gjengset J, Van Den Hooff J, Kaashoek MF, Mickens J, Morris R, Zeldovich N (2015) Amber: Decoupling user data from web applications. In: 15th workshop on hot topics in operating systems (HotOS XV)
De Montjoye YA, Shmueli E, Wang SS, Pentland AS (2014) openpds: Protecting the privacy of metadata through safeanswers. PLoS ONE 9(7):e98790
Majeed A, Hwang SO (2023) When AI meets information privacy: the adversarial role of AI in data sharing scenario. IEEE Access
Salau BA, Rawal A, Rawat DB (2022) Recent advances in artificial intelligence for wireless internet of things and cyber–physical systems: A comprehensive survey. IEEE Internet Things J 9(15):12916–12930
Dorri A, Steger M, Kanhere SS, Jurdak R (2017) Blockchain: A distributed solution to automotive security and privacy. IEEE Commun Mag 55(12):119–125
Wang J, Li M, He Y, Li H, Xiao K, Wang C (2018) A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545–17556
DE Wylde V et al (2022) The use of AI in managing big data analysis demands: status and future directions. Artific Intellig Nat Secur 47–67
Halevy A, Norvig P, Pereira F (2009) The unreasonable effectiveness of data. IEEE Intell Syst 24(2):8–12
Altun U, Basaran ST, Kurt GK, Ozdemir E (2022) Scalable secret key generation for wireless sensor networks. IEEE Syst J 16(4):6031–6041
Wang F, Li G, Wang Y, Rafique W, Khosravi MR, Liu G, Liu Y, Qi L (2023) Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city. ACM Trans Internet Technol 23(3):1–9
Alhazmi HE, Eassa FE, Sandokji SM (2022) Towards big data security framework by leveraging fragmentation and blockchain technology. IEEE Access 10:10768–10782
Latif SA, Wen FB, Iwendi C, Li-Li FW, Mohsin SM, Han Z, Band SS (2022) AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput Commun 181:274–283
Fernández M, Jaimunk J, Thuraisingham B (2022) A privacy-preserving architecture and data-sharing model for cloud-IoT applications. IEEE Trans Depend Sec Comput
Jia C, Ding H, Zhang C, Zhang X (2021) Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alex Eng J 60(1):337–346
Naresh VS, Allavarpu VD, Reddi S (2022) Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN. J Supercomp 1–25
Fang W, Zhang W, Chen W, Pan T, Ni Y, Yang Y (2020) Trust-based attack and defense in wireless sensor networks: a survey. Wirel Commun Mob Comput 2020:1–20
Lu Q, Xu X (2017) Adaptable blockchain-based systems: a case study for product traceability. IEEE Softw 34(6):21–27
Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Infor 14(4):1656–1665
Xuelian C et al (2023) An incentive mechanism for vehicular crowdsensing with security protection and data quality assurance. IEEE Trans Veh Technol
Nandini S, Kempanna M (2022) Lifetime aware secure data aggregation through integrated incentive-based mechanism in IoT-based WSN environment. In: Congress on intelligent systems: proceedings of CIS 2021, vol 2. Springer Nature, Singapore
Srivastava A, Gupta J (2023) Attack resistant blockchain-based healthcare record system using modified RSA Algorithm. Int J Inf Technol 6:1–8
Faris M et al (2023) Wireless sensor network security: a recent review based on state-of-the-art works. Int J Eng Bus Manag 15:18479790231157220
Pooja G, Naveen H (2013) Security issues in wireless sensor network: a review. Int J Eng Sci Res Technol 2(5):342–350
Meena N, Singh B (2023) An efficient coverage and connectivity maintenance using optimal adaptive learning in WSNs. Int J Inf Technol 15(8):4491–4504
Gautam AK, Kumar R (2021) A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Appl Sci 3(1):50
Cui Z et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transact Serv Comput 13(2):241–251
Simpson SV, Ravi Raju Y, Bhanu Rajesh Naidu K, Venu G (2023) SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks. Int J Inf Technol 15(8):4323–4336
Singhal D, Ahuja L, Seth A (2023) POSMETER: proof-of-stake blockchain for enhanced smart meter data security. Int J Inf Technol 17:1–4
Mishra AK, Mohapatra Y (2023) Hybrid blockchain based medical data sharing with the optimized CP-ABE for e-Health systems. Int J Inf Technol 9:1
Nithya B (2020) Cluster based key management schemes in wireless sensor networks: a survey. Proc Comput Sci 171:2684–2693
Hsiao S-J, Wen-Tsai S (2021) Employing blockchain technology to strengthen security of wireless sensor networks. IEEE Access 9:72326–72341
Moara-Nkwe Kemedi et al (2018) A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6:11374–11387
Vasala U, Sakthidharan GR (2017) Effective key management in dynamic wireless sensor networks. Int J Comput Eng Res Trends 4(7):308–312
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare they have no financial and competing interests.
Consent for publication
This research adheres to the principles that matter enclosed in this article is original and not submitted anywhere for publication.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Devi, S., Kumar, A. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation. Int. j. inf. tecnol. 16, 3325–3336 (2024). https://doi.org/10.1007/s41870-024-01879-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-024-01879-x