Secure Data Collection Scheme for Wireless Sensor Networks

被引:4
|
作者
Hwang, Ren Junn [1 ]
Huang, Yan Zhi [1 ]
机构
[1] TamKang Univ, Dept Comp Sci & Informat Engn, New Taipei, Taiwan
关键词
authentication; secure data collection; wireless sensor network; Internet of Thing; USER AUTHENTICATION SCHEME;
D O I
10.1109/WAINA.2017.2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are extensively used in various industries and environments to monitor an environment and manage risks in situations such as real-time traffic monitoring and health care. The Internet of Thing (IOT) is a wireless sensor networks. Because a WSN is an open wireless communication network, it is vulnerable to security threats and attacks. It must authenticate its partner's identity and protect collection data to avoid eavesdropping or data destruction. This paper proposes a secure data collection scheme for WSNs. In this scheme, a collector, such as the pilotless plane, authenticates the identity of a smart card owner without a gateway node. Sensor nodes verify the collector, which is activated by an authorized smart card owner, and transmit data to the collector through a secure channel. The collector also authenticates whether the collected data are derived from valid sensor nodes. This design reduces communication cost and provides a secure channel to achieve data integrity and confidentiality; mutual authentication; and increased resistance to malicious insider attacks, password guessing attacks, and replay attacks.) The proposed scheme also can apply to the scenario of Internet of Thing to robust its security.
引用
收藏
页码:553 / 558
页数:6
相关论文
共 50 条
  • [41] An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
    Hsiao Y.-K.
    Hwang R.-J.
    International Journal of Security and Networks, 2010, 5 (01) : 26 - 34
  • [42] A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks
    Wang, Baowei
    Qian, Hongwei
    Sun, Xingming
    Shen, Jian
    Xie, Xiaoyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 125 - 138
  • [43] An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks
    Zhong, Hong
    Shao, Lili
    Cui, Jie
    Xu, Yan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 1 - 12
  • [44] Secure data aggregation scheme based on homomorphic MAC for wireless sensor networks
    Zhou, Qiang
    Yang, Geng
    Chen, Lei
    Chen, Zheng-Yu
    Dai, Hua
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (07): : 1743 - 1748
  • [45] Secure and Efficient Data Collection in Sensor Networks
    Cano, Cristina
    Guerrero, Manel
    Bellalta, Boris
    WIRELESS SYSTEMS AND MOBILITY IN NEXT GENERATION INTERNET, 2008, 5122 : 37 - +
  • [46] USV-Aided Data Secure Collection Scheme for Underwater Wireless Acoustic Networks
    Hu, Zheng
    Su, Zhou
    Xu, Qichao
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7157 - 7162
  • [47] Secure multiple deployment scheme in wireless sensor networks
    Li, Guo-Rui
    He, Jing-Sha
    Wang, Ying
    Fu, Ying-Fang
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (01): : 114 - 118
  • [48] A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 101 - 108
  • [50] A Secure Mutual Trust Scheme for Wireless Sensor Networks
    Yein, Alan Dahgwo
    Lin, Chih-Hsueh
    Hsieh, Wen-Shyong
    Hsieh, Wen-Shyong
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 1369 - 1375