| Literature DB >> 28042831 |
Sandeep Pirbhulal1,2,3, Heye Zhang4,5, Md Eshrat E Alahi6,7, Hemant Ghayvat8, Subhas Chandra Mukhopadhyay9,10, Yuan-Ting Zhang11, Wanqing Wu12,13.
Abstract
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.Entities:
Keywords: energy-efficient; home automation; internet of things; security; wireless sensor networks
Year: 2016 PMID: 28042831 PMCID: PMC5298642 DOI: 10.3390/s17010069
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The components for the sensor node: (a) temperature Sensor; (b) Wi-Fi Module (N-2320); (c) Intel Galileo Board.
Figure 2The hardware implementation of WSNs.
Figure 3Source-destination data communication model.
Figure 4Key generation mechanism for proposed TBSA.
Figure 5Triangle STU.
Figure 6Three-levels of network security for IoT-based systems.
Figure 7Experimental setup for investigating the energy consumption.
Figure 8Temperature values against corresponding voltage values.
Figure 9Original message from sensor node 1 and sensor node 2.
Figure 10Cipher message from sensor node 1 and sensor node 2 by using proposed TBSA.
Figure 11Energy consumption comparison of proposed TBSA (a) with Hash Functions; (b) with Symmetric Cipher.
Energy Consumption Comparison with Hash Functions.
| S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
|---|---|---|
| 1 | Proposed TBSA | 0.20 |
| 2 | MD4 | 0.52 |
| 3 | MD5 | 0.59 |
| 4 | SHA-1 | 0.76 |
| 5 | HMAC | 1.16 |
TBSA: Triangle Based Security Algorithm, MD4: Message Digest 4, MD5: Message Digest 5, SHA-1: Secure Hash Algorithm 1, HMAC: Hash Message Authentication Code.
Energy consumption comparison with symmetric cipher.
| S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
|---|---|---|
| 1 | Proposed TBSA | 0.20 |
| 2 | RC4 | 0.49 |
| 3 | Blowfish | 0.81 |
| 4 | AES | 1.20 |
| 5 | DES | 2.80 |
TBSA: Triangle Based Security Algorithm, RC4: Rivest Cipher 4, AES: Encryption Standard, DES: Advanced Encryption Standard
Energy consumption comparison with security methods designed for WSNs.
| S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
|---|---|---|
| 1 | Proposed TBSA | 0.20 |
| 2 | PAWN | 0.36 |
| 3 | PRESENT-GRP | 0.47 |
| 4 | Alarm-Net | 0.53 |
Figure 12Energy consumption comparison of proposed TBSA with security mechanisms developed for WSNs.