| Literature DB >> 32349237 |
Khalid Haseeb1, Ahmad Almogren2, Ikram Ud Din3, Naveed Islam1, Ayman Altameem4.
Abstract
Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.Entities:
Keywords: Internet of Things; node’s security; sensor-cloud; unsupervised learning; wireless sensor network
Year: 2020 PMID: 32349237 PMCID: PMC7250029 DOI: 10.3390/s20092468
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Block diagram of Secure Sensor Cloud Architecture (SASC) Architecture.
Default network factors.
| Factor | Value |
|---|---|
| Number of malicious nodes | 10 |
| Transport layer protocol | UDP |
|
| 50 nJ/ bit |
|
| 10 nJ/bit/m2 |
|
| 0.0013 pJ/bit/m4 |
| Packet size, k | 20 bits |
| Payload size | 512 bytes |
| Initial energy | 5 J |
| α, β | 0.5, 0.5 |
| Nodes transmission range | 20 m |
Figure 2Network lifetime in a varying number of nodes.
Figure 3Network lifetime in varying CBR data traffic.
Figure 4Packet drop ratio in a varying number of nodes.
Figure 5Packet drop ratio in varying CBR data traffic.
Figure 6Energy consumption in a varying number of nodes.
Figure 7Energy consumption in varying CBR data traffic.
Figure 8Average end-to-end delay in a varying number of nodes.
Figure 9Average end-to-end delay in varying CBR data traffic.
Figure 10Transmission overhead in a varying number of nodes.
Figure 11Transmission overhead in varying CBR data traffic.