Skip to main content
Log in

Revamping data access privacy preservation method against inside attacks in wireless sensor networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Despite more privacy preservation techniques available in wireless sensor networks (WSN), no modest technique dealt with compromised nodes. Among several applications, healthcare applications fit into WSNs environment for patient monitoring from work place, hospital and home. More predictable security threats are in healthcare applications against both outside and inside attacks. For example, data breach, access control, eavesdropping, modification, and impersonation are vulnerable. On hand clarifications protect the user’s personal information from the external attackers. But, they are unable to fight against compromised attacks internally by knowing all user data and security credentials. The existing premier cryptosystem is unable to protect the user’s data against compromised attacks. Also, WSNs provide flexible data aggregation structures and routing protocols to maintain end-to-end data privacy. In this proposal, a sensible approach is proposed to put off the inside attacks by many data servers to store user data. In this proposal, the paillier cryptosystem is used for distributing data to many data servers in a secured manner exclusively maintaining privacy. This proposal continues to preserve the data privacy only if any one of the data server is not compromised. A thorough security analysis and extensive simulations show that our protocol can ensure end-to-end privacy with low overhead for communication, memory and computation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Liu, J., Kwak, K., Ameen, MAl: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012)

    Article  Google Scholar 

  2. Chakravorty, R.: A Programmable Service Architecture for Mobile Medical Care. In: Proc., IEEE International Conference on Pervasive Computing and Communication, Pisa, Italy, pp. 13–17 (2006)

  3. Jones, T.F., Moulton, S., Malan, D., Welsh, M.: CodeBlue: an ad-hoc sensor network infrastructure for emergency medical care. In: Proc. MobiSys Workshop on Applications of Mobile Embedded Systems, Boston, USA, pp. 6–9 (2004)

  4. Virone, T., Wood, A., Cao, Q., Wu, Y., Doan, T.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. Technical Report, Department of Computer Science, University of Virginia, USA (2006)

  5. Lim, J.H., Ko, J., Chen, Y., Musaloiu-E, R., Masson, G.M.: MEDiSN: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. 10, 1–29 (2010)

    Google Scholar 

  6. Lo, B., Ng, J., Wells, O., Sloman, M., Peters, N., Darzi, A., Yang, G. Z.: Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon). In: Proc., International Conference on Ubiquitous Computing, Nottingham, UK, pp. 7–14 (2004)

  7. AL-mawee, W.: Privacy and Security issues in IoT Healthcare Applications for the disabled users a survey, Master’s Theses, Western Michigan University, p. 651 (2015)

  8. Wang, J., Zhang, Z., Xu, K., Yin, Y., Guo, P.: A research on security and privacy issues for patient related data in medical organization system. Int. J. Secur. Appl. 7(4), 287–298 (2013)

    Google Scholar 

  9. Guo, J., Fang, J.A., Chen, X.: Survey on secure data aggregation for wireless sensor networks. In: IEEE (2011)

  10. Jose, J., Jose, J.: Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey. Modern Education and Computer Science Press, Hong Kong (2014)

    Book  Google Scholar 

  11. Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sens. J. 12, 55–91 (2012)

    Article  Google Scholar 

  12. Secretary of Commerce, NIST—ITL, Advanced Encryption Standard (AES)., Federal Information Processing Standards Publication (197) (2001)

  13. Kumar, P., Lee, H.J., Lee, Y.D.: Secure health monitoring using medical wireless sensor networks. In: Proc., International Conference on Networked Computing and Advanced Information Management, Korea, pp. 491–494 (2010)

  14. Zhao, H., Qin, J., Hu, J.: An energy efficient key management scheme for body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(11), 2202–2210 (2013)

    Article  Google Scholar 

  15. Yi, X., Nat-Abdesselam, F., Willemson, J.: Privacy-preserving wireless medical sensor network. In: Proceddings of TRUSTCOM’13, pp. 118–125 (2013)

  16. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  17. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  18. He, D., Chan, S., Tang, S.: A novel and lightweight system to secure wireless medical sensor networks. IEEE J. Biomed. Health Inf. 18(1), 316–326 (2014)

    Article  Google Scholar 

  19. Malasri, K., Wang, L.: Design and implementation of secure wireless mote-based medical sensor network. Sens. J. 9, 6273–6297 (2009)

    Article  Google Scholar 

  20. Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor network in healthcare. J. Netw. 27, 355–364 (2011)

    Google Scholar 

  21. Patel, K.J., Raja, N.M.: Secure end to end data aggregation using public key encryption in wireless sensor network. Int. J. Comput. Appl. 122(6), 27–32 (2015)

    Google Scholar 

  22. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)

    Article  MATH  Google Scholar 

  23. Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2011). https://doi.org/10.1007/s11235-011-9539-8

    Article  Google Scholar 

  24. He, D., Bu, J., Zhu, S., Chan, S., Chen, C.: Distributed access control with privacy support in wireless sensor network. IEEE Trans. Wirel. Commun. 10(10), 3472–3481 (2011)

    Article  Google Scholar 

  25. Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. Eurocrypt 99, 223–238 (1999)

    MathSciNet  MATH  Google Scholar 

  26. Secretary of Commerce, NIST—ITL, Digital Signature Standard (DSS)., Federal Information Processing Standards Publication (186-4)(2013)

  27. Zoltak, B.: An Efficient Message Authentication scheme for Stream Cipher. Cryptography ePrint Archive (2004)

  28. Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Depend. Secur. Comput. 13(3), 369–380 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sathees Babu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Babu, S.S., Balasubadra, K. Revamping data access privacy preservation method against inside attacks in wireless sensor networks. Cluster Comput 22 (Suppl 1), 65–75 (2019). https://doi.org/10.1007/s10586-018-1706-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1706-1

Keywords

Navigation