Abstract
With the revolution of the Internet technology, smart-sensing applications and the Internet of Things (IoT) are coupled in critical missions. Wireless sensor networks (WSNs), for example, present the main enabling technology in IoT architectures and extend the spectrum of their smart applications. However, this technology has limited resources and suffers from several vulnerabilities and security issues. Since the wireless networks used by this technology are deployed in open areas, several challenges are faced by the service provider in terms of privacy and the quality of service. Encryption can be a good solution to preserve confidentiality and privacy, but it raises serious problems concerning time latency and performance. In this paper, we propose agile framework that enables authentication, confidentiality and integrity while collecting the sensed data by using elliptic curve cryptography.
Similar content being viewed by others
References
Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330
Alabady S, Al-Turjman F (2018) A novel approach for error detection and correction for efficient energy in wireless networks. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6282-0
Debnath A, Singaravelu P, Verma S (2014) Privacy in wireless sensor networks using ring signature. J King Saud Univ Comput Inf Sci 26(2):228–236
Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sens Actuators, A 156:394–405
Sarigiannidis P, Karapistoli E, Economides A (2015) Detecting Sybil attacks in Wireless Sensor Networks using UWB ranging-based information. Expert Syst Appl 42:7560–7572
Al-Turjman F (2018) QoS–aware data delivery framework for safety-inspired multimedia in integrated vehicular-IoT. Comput Commun 121:33–43
Demir S, Al-Turjman F (2018) Energy scavenging methods for WBAN applications: a review. IEEE Sens J 18(16):6477–6488
Mell P, Grance T (2011) The NIST definition of cloud computing. Special Publication, London
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599–616
Zkik K, Orhanou G, El Hajji S (2016) Secure scheme on mobile multi cloud computing based on homomorphic encryption. In: Proceeding of the International Conference on Engineering & MIS (ICEMIS), pp 1–7
Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744
Al-Turjman F (2017) Information-centric framework for the internet of things (IoT): traffic modelling & optimization. Future Gener Comput Syst 80(1):63–75
Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. In: Towards a quarter-century of public key cryptography. pp 103–123
Gura N, Patel A, Wander A, Eberle H, Chang Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 3156:119–132
Alabady S, Al-Turjman F, Din S (2018) A novel security model for cooperative virtual networks in the IoT era. Int J Parallel Prog. https://doi.org/10.1007/s10766-018-0580-z
Rodrigues JJ, de la Torre I, Fernández G, López-Coronado M (2013) Analysis of the security and privacy requirements of cloud-based electronic health records systems. J Med Internet Res 15(8):e186
Cheng L, Li W, Ma D (2015) Secret key generation via random beamforming in stationary environment. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp 1–5
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Turjman, F., Alturjman, S. Confidential smart-sensing framework in the IoT era. J Supercomput 74, 5187–5198 (2018). https://doi.org/10.1007/s11227-018-2524-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2524-1