Skip to main content
Log in

Confidential smart-sensing framework in the IoT era

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the revolution of the Internet technology, smart-sensing applications and the Internet of Things (IoT) are coupled in critical missions. Wireless sensor networks (WSNs), for example, present the main enabling technology in IoT architectures and extend the spectrum of their smart applications. However, this technology has limited resources and suffers from several vulnerabilities and security issues. Since the wireless networks used by this technology are deployed in open areas, several challenges are faced by the service provider in terms of privacy and the quality of service. Encryption can be a good solution to preserve confidentiality and privacy, but it raises serious problems concerning time latency and performance. In this paper, we propose agile framework that enables authentication, confidentiality and integrity while collecting the sensed data by using elliptic curve cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330

    Article  Google Scholar 

  2. Alabady S, Al-Turjman F (2018) A novel approach for error detection and correction for efficient energy in wireless networks. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6282-0

    Article  Google Scholar 

  3. Debnath A, Singaravelu P, Verma S (2014) Privacy in wireless sensor networks using ring signature. J King Saud Univ Comput Inf Sci 26(2):228–236

    Google Scholar 

  4. Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sens Actuators, A 156:394–405

    Article  Google Scholar 

  5. Sarigiannidis P, Karapistoli E, Economides A (2015) Detecting Sybil attacks in Wireless Sensor Networks using UWB ranging-based information. Expert Syst Appl 42:7560–7572

    Article  Google Scholar 

  6. Al-Turjman F (2018) QoS–aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT. Comput Commun 121:33–43

    Article  Google Scholar 

  7. Demir S, Al-Turjman F (2018) Energy scavenging methods for WBAN applications: a review. IEEE Sens J 18(16):6477–6488

    Article  Google Scholar 

  8. Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, London

    Book  Google Scholar 

  9. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599–616

    Article  Google Scholar 

  10. Zkik K, Orhanou G, El Hajji S (2016) Secure scheme on mobile multi cloud computing based on homomorphic encryption. In: Proceeding of the International Conference on Engineering & MIS (ICEMIS), pp 1–7

  11. Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744

    Article  Google Scholar 

  12. Al-Turjman F (2017) Information-centric framework for the internet of things (IoT): traffic modelling & optimization. Future Gener Comput Syst 80(1):63–75

    Google Scholar 

  13. Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. In: Towards a quarter-century of public key cryptography. pp 103–123

    Chapter  Google Scholar 

  14. Gura N, Patel A, Wander A, Eberle H, Chang Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 3156:119–132

    Article  Google Scholar 

  15. Alabady S, Al-Turjman F, Din S (2018) A novel security model for cooperative virtual networks in the IoT era. Int J Parallel Prog. https://doi.org/10.1007/s10766-018-0580-z

    Article  Google Scholar 

  16. Rodrigues JJ, de la Torre I, Fernández G, López-Coronado M (2013) Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 15(8):e186

    Article  Google Scholar 

  17. Cheng L, Li W, Ma D (2015) Secret key generation via random beamforming in stationary environment. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp 1–5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sinem Alturjman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Turjman, F., Alturjman, S. Confidential smart-sensing framework in the IoT era. J Supercomput 74, 5187–5198 (2018). https://doi.org/10.1007/s11227-018-2524-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2524-1

Keywords

Navigation