Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 65–75 | Cite as

Revamping data access privacy preservation method against inside attacks in wireless sensor networks

  • S. Sathees BabuEmail author
  • K. Balasubadra
Article
  • 111 Downloads

Abstract

Despite more privacy preservation techniques available in wireless sensor networks (WSN), no modest technique dealt with compromised nodes. Among several applications, healthcare applications fit into WSNs environment for patient monitoring from work place, hospital and home. More predictable security threats are in healthcare applications against both outside and inside attacks. For example, data breach, access control, eavesdropping, modification, and impersonation are vulnerable. On hand clarifications protect the user’s personal information from the external attackers. But, they are unable to fight against compromised attacks internally by knowing all user data and security credentials. The existing premier cryptosystem is unable to protect the user’s data against compromised attacks. Also, WSNs provide flexible data aggregation structures and routing protocols to maintain end-to-end data privacy. In this proposal, a sensible approach is proposed to put off the inside attacks by many data servers to store user data. In this proposal, the paillier cryptosystem is used for distributing data to many data servers in a secured manner exclusively maintaining privacy. This proposal continues to preserve the data privacy only if any one of the data server is not compromised. A thorough security analysis and extensive simulations show that our protocol can ensure end-to-end privacy with low overhead for communication, memory and computation.

Keywords

Public key cryptosystem The Paillier encryption Internally compromised attacks End-to-end data privacy 

References

  1. 1.
    Liu, J., Kwak, K., Ameen, MAl: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)CrossRefGoogle Scholar
  2. 2.
    Chakravorty, R.: A Programmable Service Architecture for Mobile Medical Care. In: Proc., IEEE International Conference on Pervasive Computing and Communication, Pisa, Italy, pp. 13–17 (2006)Google Scholar
  3. 3.
    Jones, T.F., Moulton, S., Malan, D., Welsh, M.: CodeBlue: an ad-hoc sensor network infrastructure for emergency medical care. In: Proc. MobiSys Workshop on Applications of Mobile Embedded Systems, Boston, USA, pp. 6–9 (2004)Google Scholar
  4. 4.
    Virone, T., Wood, A., Cao, Q., Wu, Y., Doan, T.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Technical Report, Department of Computer Science, University of Virginia, USA (2006)Google Scholar
  5. 5.
    Lim, J.H., Ko, J., Chen, Y., Musaloiu-E, R., Masson, G.M.: MEDiSN: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. 10, 1–29 (2010)Google Scholar
  6. 6.
    Lo, B., Ng, J., Wells, O., Sloman, M., Peters, N., Darzi, A., Yang, G. Z.: Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon). In: Proc., International Conference on Ubiquitous Computing, Nottingham, UK, pp. 7–14 (2004)Google Scholar
  7. 7.
    AL-mawee, W.: Privacy and Security issues in IoT Healthcare Applications for the disabled users a survey, Master’s Theses, Western Michigan University, p. 651 (2015)Google Scholar
  8. 8.
    Wang, J., Zhang, Z., Xu, K., Yin, Y., Guo, P.: A research on security and privacy issues for patient related data in medical organization system. Int. J. Secur. Appl. 7(4), 287–298 (2013)Google Scholar
  9. 9.
    Guo, J., Fang, J.A., Chen, X.: Survey on secure data aggregation for wireless sensor networks. In: IEEE (2011)Google Scholar
  10. 10.
    Jose, J., Jose, J.: Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey. Modern Education and Computer Science Press, Hong Kong (2014)CrossRefGoogle Scholar
  11. 11.
    Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sens. J. 12, 55–91 (2012)CrossRefGoogle Scholar
  12. 12.
    Secretary of Commerce, NIST—ITL, Advanced Encryption Standard (AES)., Federal Information Processing Standards Publication (197) (2001)Google Scholar
  13. 13.
    Kumar, P., Lee, H.J., Lee, Y.D.: Secure health monitoring using medical wireless sensor networks. In: Proc., International Conference on Networked Computing and Advanced Information Management, Korea, pp. 491–494 (2010)Google Scholar
  14. 14.
    Zhao, H., Qin, J., Hu, J.: An energy efficient key management scheme for body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(11), 2202–2210 (2013)CrossRefGoogle Scholar
  15. 15.
    Yi, X., Nat-Abdesselam, F., Willemson, J.: Privacy-preserving wireless medical sensor network. In: Proceddings of TRUSTCOM’13, pp. 118–125 (2013)Google Scholar
  16. 16.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    He, D., Chan, S., Tang, S.: A novel and lightweight system to secure wireless medical sensor networks. IEEE J. Biomed. Health Inf. 18(1), 316–326 (2014)CrossRefGoogle Scholar
  19. 19.
    Malasri, K., Wang, L.: Design and implementation of secure wireless mote-based medical sensor network. Sens. J. 9, 6273–6297 (2009)CrossRefGoogle Scholar
  20. 20.
    Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor network in healthcare. J. Netw. 27, 355–364 (2011)Google Scholar
  21. 21.
    Patel, K.J., Raja, N.M.: Secure end to end data aggregation using public key encryption in wireless sensor network. Int. J. Comput. Appl. 122(6), 27–32 (2015)Google Scholar
  22. 22.
    Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)CrossRefzbMATHGoogle Scholar
  23. 23.
    Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2011).  https://doi.org/10.1007/s11235-011-9539-8 CrossRefGoogle Scholar
  24. 24.
    He, D., Bu, J., Zhu, S., Chan, S., Chen, C.: Distributed access control with privacy support in wireless sensor network. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)CrossRefGoogle Scholar
  25. 25.
    Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)MathSciNetzbMATHGoogle Scholar
  26. 26.
    Secretary of Commerce, NIST—ITL, Digital Signature Standard (DSS)., Federal Information Processing Standards Publication (186-4)(2013)Google Scholar
  27. 27.
    Zoltak, B.: An Efficient Message Authentication scheme for Stream Cipher. Cryptography ePrint Archive (2004)Google Scholar
  28. 28.
    Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Depend. Secur. Comput. 13(3), 369–380 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Science and EngineeringPSNA College of Engg. & TechDindigulIndia
  2. 2.Department of ITRMD College of Engg. and TechChennaiIndia

Personalised recommendations