Circuits, Systems, and Signal Processing

, Volume 32, Issue 3, pp 1363–1387 | Cite as

A Distributed Secure Data Collection Scheme via Chaotic Compressed Sensing in Wireless Sensor Networks

Article

Abstract

Motivated by chaos technology and compressed sensing, we propose a distributed secure data collection scheme via chaotic compressed sensing in wireless sensor networks. The chaotic compressed sensing is applied to the encrypted compression of sensory data for sensor node and the data acquisition for whole sensory in wireless sensor networks. The proposed scheme is suitable for long-term and large scale wireless sensor networks with energy efficiency, network lifetime and security. A sensing matrix generation algorithm and active node matrix algorithm based on chaos sequence are proposed to ensure the secure and efficient transmission of sensor packets. The secret key crack, forgery, hijack jamming and replay attacks on the proposed algorithm are evaluated to show the robustness of this scheme. Simulations and real data examples are also given to show that the proposed scheme can ensure the secure data acquisition in wireless sensor networks efficiently.

Keywords

Chaotic compressed sensing Wireless sensor network Security Data collection 

Notes

Acknowledgements

This work is supported by National NSFC 60802009, China National Science and Technology Major Project 2013ZX03003-002-04 and 2010ZX03003-001-02, Sino-Korea International Cooperation Project 2012DFG12250, and Key Laboratory of Universal Wireless Communications Foundation Project. The work is also supported by China–EU International Scientific and Technological Cooperation Program (0902).

References

  1. 1.
    A.M. Abdulghani, E. Rodriguez-Villegas, Compressive sensing: from “compressing while sampling” to “compressing and securing while sampling”, in 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2010), pp. 1127–1130 CrossRefGoogle Scholar
  2. 2.
    C.L. Barrett, S.J. Eidenbenz, L. Kroc, M. Marathe, J.P. Smith, Parametric probabilistic routing in sensor networks. Mob. Netw. Appl. 10(4), 529–544 (2005) CrossRefGoogle Scholar
  3. 3.
    S. Boccaletti, C. Grebogi, Y.C. Lai, H. Mancini, D. Maza, The control of chaos: theory and applications. Phys. Rep. 329(3), 103–197 (2000) MathSciNetCrossRefGoogle Scholar
  4. 4.
    E.J. Candes, T. Tao, Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006) MathSciNetCrossRefGoogle Scholar
  5. 5.
    X. Chen, K. Makki, K. Yen, N. Pissinou, Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009) CrossRefGoogle Scholar
  6. 6.
    D. Ebdon, Statistics in Geography (Blackwell, Oxford, 1985) Google Scholar
  7. 7.
    V.P. Dinh, L.T. Nguyen, D.T. Tran, V.L. Ha, M.N. Do, Fast image collection in magnetic resonance imaging by chaotic compressed sensing, in 2011 IEEE International Symposium on Biomedical Imaging: From Nano to Macro (2011), pp. 85–88 Google Scholar
  8. 8.
    D. Djenouri, L. Khelladi, A.N. Badache, A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutor. 7(2), 2–28 (2005) CrossRefGoogle Scholar
  9. 9.
    F. Fazel, M. Fazel, M. Stojanovic, Random access compressed sensing for energy-efficient underwater sensor networks. IEEE J. Sel. Areas Commun. 29(8), 660–1670 (2011) CrossRefGoogle Scholar
  10. 10.
    X.Y. He, R.F. Song, W.P. Zhu, Optimal pilot pattern design for compressed sensing-based sparse channel estimation in OFDM systems. Circuits Syst. Signal Process. 31(4), 1379–1395 (2012) MathSciNetCrossRefGoogle Scholar
  11. 11.
    G. Kaddoum, A.J. Lawrance, P. Charge, Chaos communication performance: theory and computation. Circuits Syst. Signal Process. 30(1), 185–208 (2011) MathSciNetMATHCrossRefGoogle Scholar
  12. 12.
    G. Kaddoum, S. Gagne, F. Gagnon, Removing cyclostationary properties in a chaos-based communication system. Circuits Syst. Signal Process. 30(6), 1391–1400 (2011) MathSciNetCrossRefGoogle Scholar
  13. 13.
    Y.W. Law, G. Moniava, Z. Gong, P. Hartel, M. Palaniswami, KALwEN: a new practical and interoperable key management scheme for body sensor networks. Secur. Commun. Netw. 4(11), 1309–1329 (2010) CrossRefGoogle Scholar
  14. 14.
    P.P.C. Lee, V. Misra, D. Rubenstein, Distributed algorithms for secure multipath routing, in IEEE INFOCOM 2005: The Conference on Computer Communications (2005), pp. 1952–1963 Google Scholar
  15. 15.
    Q. Ling, Z. Tian, Decentralized sparse signal recovery for compressive sleeping wireless sensor networks. IEEE Trans. Signal Process. 58(7), 3816–3827 (2010) MathSciNetCrossRefGoogle Scholar
  16. 16.
    C. Luo, F. Wu, J. Sun, C.W. Chen, Compressive data gathering for large-scale wireless sensor networks, in Fifteenth ACM International Conference on Mobile Computing and Networking (2009), pp. 145–156 Google Scholar
  17. 17.
    J. Luo, L. Xiang L, C. Rosenberg, Does compressed sensing improve the throughput of wireless sensor networks? in 2010 IEEE International Conference on Communications (2010), pp. 1–6 CrossRefGoogle Scholar
  18. 18.
    S. Malladi, J. Alves-Foss, R. Heckendorn, On preventing replay attacks on security protocols, in International Conference on Security and Management (2002), pp. 77–83 Google Scholar
  19. 19.
    C. Poepper, M. Strasser, S. Capkun, Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J. Sel. Areas Commun. 28(5), 703–715 (2010) CrossRefGoogle Scholar
  20. 20.
    R.O. Preda, D.N. Vizireanu, A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement 43(10), 1720–1726 (2010) CrossRefGoogle Scholar
  21. 21.
    R.O. Preda, D.N. Vizireanu, Quantisation-based video watermarking in the wavelet domain with spatial and temporal redundancy. Int. J. Electron. 98(3), 393–405 (2011) CrossRefGoogle Scholar
  22. 22.
    R. Roman R, C. Alcaraz, J. Lopez, N. Sklavos, Key management systems for sensor networks in the context of the Internet of things. Comput. Electr. Eng. 37(2), 147–159 (2011) CrossRefGoogle Scholar
  23. 23.
    T. Shu, M. Krunz, S. Liu, Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. 9(7), 941–954 (2010) CrossRefGoogle Scholar
  24. 24.
    D.N. Vizireanu, A fast, simple and accurate time-varying frequency estimation method for single-phase electric power systems. Measurement 45(5), 1331–1333 (2012) CrossRefGoogle Scholar
  25. 25.
    D.N. Vizireanu, S.V. Halunga, Simple, fast and accurate eight points amplitude estimation method of sinusoidal signals for DSP based instrumentation. J. Instrum. 7(4), 1–11 (2012) CrossRefGoogle Scholar
  26. 26.
    W. Wang, M. Garofalakis, K. Ramchandran, Distributed sparse random projections for refinable approximation, in Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks (2007), pp. 331–339 CrossRefGoogle Scholar
  27. 27.
    L. Yu, J.P. Barbot, G. Zheng, H. Sun, Compressive sensing with chaotic sequence. IEEE Signal Process. Lett. 17(8), 731–734 (2010) CrossRefGoogle Scholar
  28. 28.
    H. Zhang, Y. Shi, A.S. Mehr, Robust H∞ PID control for multivariable networked control systems with disturbance/noise attenuation. Int. J. Robust Nonlinear Control 22(2), 183–204 (2012) MathSciNetMATHCrossRefGoogle Scholar
  29. 29.
    H. Zhang, Y. Shi, A.S. Mehr, Robust weighted H∞ filtering for networked systems with intermitted measurements of multiple sensors. Int. J. Adapt. Control Signal Process. 25(4), 313–330 (2011) MathSciNetMATHCrossRefGoogle Scholar
  30. 30.

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Dept. of Elec. and Information Engn. at Huazhong Univ. of Sci. and Technol.Wuhan National Laboratory for OptoelectronicsWuhanChina

Personalised recommendations