Abstract
Despite more privacy preservation techniques available in wireless sensor networks (WSN), no modest technique dealt with compromised nodes. Among several applications, healthcare applications fit into WSNs environment for patient monitoring from work place, hospital and home. More predictable security threats are in healthcare applications against both outside and inside attacks. For example, data breach, access control, eavesdropping, modification, and impersonation are vulnerable. On hand clarifications protect the user’s personal information from the external attackers. But, they are unable to fight against compromised attacks internally by knowing all user data and security credentials. The existing premier cryptosystem is unable to protect the user’s data against compromised attacks. Also, WSNs provide flexible data aggregation structures and routing protocols to maintain end-to-end data privacy. In this proposal, a sensible approach is proposed to put off the inside attacks by many data servers to store user data. In this proposal, the paillier cryptosystem is used for distributing data to many data servers in a secured manner exclusively maintaining privacy. This proposal continues to preserve the data privacy only if any one of the data server is not compromised. A thorough security analysis and extensive simulations show that our protocol can ensure end-to-end privacy with low overhead for communication, memory and computation.
Similar content being viewed by others
References
Liu, J., Kwak, K., Ameen, MAl: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)
Chakravorty, R.: A Programmable Service Architecture for Mobile Medical Care. In: Proc., IEEE International Conference on Pervasive Computing and Communication, Pisa, Italy, pp. 13–17 (2006)
Jones, T.F., Moulton, S., Malan, D., Welsh, M.: CodeBlue: an ad-hoc sensor network infrastructure for emergency medical care. In: Proc. MobiSys Workshop on Applications of Mobile Embedded Systems, Boston, USA, pp. 6–9 (2004)
Virone, T., Wood, A., Cao, Q., Wu, Y., Doan, T.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Technical Report, Department of Computer Science, University of Virginia, USA (2006)
Lim, J.H., Ko, J., Chen, Y., Musaloiu-E, R., Masson, G.M.: MEDiSN: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. 10, 1–29 (2010)
Lo, B., Ng, J., Wells, O., Sloman, M., Peters, N., Darzi, A., Yang, G. Z.: Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon). In: Proc., International Conference on Ubiquitous Computing, Nottingham, UK, pp. 7–14 (2004)
AL-mawee, W.: Privacy and Security issues in IoT Healthcare Applications for the disabled users a survey, Master’s Theses, Western Michigan University, p. 651 (2015)
Wang, J., Zhang, Z., Xu, K., Yin, Y., Guo, P.: A research on security and privacy issues for patient related data in medical organization system. Int. J. Secur. Appl. 7(4), 287–298 (2013)
Guo, J., Fang, J.A., Chen, X.: Survey on secure data aggregation for wireless sensor networks. In: IEEE (2011)
Jose, J., Jose, J.: Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey. Modern Education and Computer Science Press, Hong Kong (2014)
Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sens. J. 12, 55–91 (2012)
Secretary of Commerce, NIST—ITL, Advanced Encryption Standard (AES)., Federal Information Processing Standards Publication (197) (2001)
Kumar, P., Lee, H.J., Lee, Y.D.: Secure health monitoring using medical wireless sensor networks. In: Proc., International Conference on Networked Computing and Advanced Information Management, Korea, pp. 491–494 (2010)
Zhao, H., Qin, J., Hu, J.: An energy efficient key management scheme for body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(11), 2202–2210 (2013)
Yi, X., Nat-Abdesselam, F., Willemson, J.: Privacy-preserving wireless medical sensor network. In: Proceddings of TRUSTCOM’13, pp. 118–125 (2013)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
He, D., Chan, S., Tang, S.: A novel and lightweight system to secure wireless medical sensor networks. IEEE J. Biomed. Health Inf. 18(1), 316–326 (2014)
Malasri, K., Wang, L.: Design and implementation of secure wireless mote-based medical sensor network. Sens. J. 9, 6273–6297 (2009)
Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor network in healthcare. J. Netw. 27, 355–364 (2011)
Patel, K.J., Raja, N.M.: Secure end to end data aggregation using public key encryption in wireless sensor network. Int. J. Comput. Appl. 122(6), 27–32 (2015)
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)
Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2011). https://doi.org/10.1007/s11235-011-9539-8
He, D., Bu, J., Zhu, S., Chan, S., Chen, C.: Distributed access control with privacy support in wireless sensor network. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)
Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)
Secretary of Commerce, NIST—ITL, Digital Signature Standard (DSS)., Federal Information Processing Standards Publication (186-4)(2013)
Zoltak, B.: An Efficient Message Authentication scheme for Stream Cipher. Cryptography ePrint Archive (2004)
Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Depend. Secur. Comput. 13(3), 369–380 (2016)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Babu, S.S., Balasubadra, K. Revamping data access privacy preservation method against inside attacks in wireless sensor networks. Cluster Comput 22 (Suppl 1), 65–75 (2019). https://doi.org/10.1007/s10586-018-1706-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-1706-1