The Journal of Supercomputing

, Volume 74, Issue 10, pp 5187–5198 | Cite as

Confidential smart-sensing framework in the IoT era

  • Fadi Al-Turjman
  • Sinem AlturjmanEmail author


With the revolution of the Internet technology, smart-sensing applications and the Internet of Things (IoT) are coupled in critical missions. Wireless sensor networks (WSNs), for example, present the main enabling technology in IoT architectures and extend the spectrum of their smart applications. However, this technology has limited resources and suffers from several vulnerabilities and security issues. Since the wireless networks used by this technology are deployed in open areas, several challenges are faced by the service provider in terms of privacy and the quality of service. Encryption can be a good solution to preserve confidentiality and privacy, but it raises serious problems concerning time latency and performance. In this paper, we propose agile framework that enables authentication, confidentiality and integrity while collecting the sensed data by using elliptic curve cryptography.


Data delivery Internet of Things (IoT) Wireless networks Routing Big data 


  1. 1.
    Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRefGoogle Scholar
  2. 2.
    Alabady S, Al-Turjman F (2018) A novel approach for error detection and correction for efficient energy in wireless networks. Multimed Tools Appl. CrossRefGoogle Scholar
  3. 3.
    Debnath A, Singaravelu P, Verma S (2014) Privacy in wireless sensor networks using ring signature. J King Saud Univ Comput Inf Sci 26(2):228–236Google Scholar
  4. 4.
    Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sens Actuators, A 156:394–405CrossRefGoogle Scholar
  5. 5.
    Sarigiannidis P, Karapistoli E, Economides A (2015) Detecting Sybil attacks in Wireless Sensor Networks using UWB ranging-based information. Expert Syst Appl 42:7560–7572CrossRefGoogle Scholar
  6. 6.
    Al-Turjman F (2018) QoS–aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT. Comput Commun 121:33–43CrossRefGoogle Scholar
  7. 7.
    Demir S, Al-Turjman F (2018) Energy scavenging methods for WBAN applications: a review. IEEE Sens J 18(16):6477–6488CrossRefGoogle Scholar
  8. 8.
    Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, LondonCrossRefGoogle Scholar
  9. 9.
    Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599–616CrossRefGoogle Scholar
  10. 10.
    Zkik K, Orhanou G, El Hajji S (2016) Secure scheme on mobile multi cloud computing based on homomorphic encryption. In: Proceeding of the International Conference on Engineering & MIS (ICEMIS), pp 1–7Google Scholar
  11. 11.
    Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744CrossRefGoogle Scholar
  12. 12.
    Al-Turjman F (2017) Information-centric framework for the internet of things (IoT): traffic modelling & optimization. Future Gener Comput Syst 80(1):63–75Google Scholar
  13. 13.
    Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. In: Towards a quarter-century of public key cryptography. pp 103–123Google Scholar
  14. 14.
    Gura N, Patel A, Wander A, Eberle H, Chang Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 3156:119–132CrossRefGoogle Scholar
  15. 15.
    Alabady S, Al-Turjman F, Din S (2018) A novel security model for cooperative virtual networks in the IoT era. Int J Parallel Prog. CrossRefGoogle Scholar
  16. 16.
    Rodrigues JJ, de la Torre I, Fernández G, López-Coronado M (2013) Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 15(8):e186CrossRefGoogle Scholar
  17. 17.
    Cheng L, Li W, Ma D (2015) Secret key generation via random beamforming in stationary environment. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp 1–5Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Antalya Bilim UniversityAntalyaTurkey

Personalised recommendations