| Literature DB >> 34914706 |
Ahmed Salim1,2, Ahmed Ismail3,4, Walid Osamy5,3, Ahmed M Khedr6,2.
Abstract
Compressive Sensing (CS) based data collection schemes are found to be effective in enhancing the data collection performance and lifetime of IoT based WSNs. However, they face major challenges related to key distribution and adversary attacks in hostile and complex network deployments. As a result, such schemes cannot effectively ensure the security of data. Towards the goal of providing high security and efficiency in data collection performance of IoT based WSNs, we propose a new security scheme that amalgamates the advantages of CS and Elliptic Curve Cryptography (ECC). We present an efficient algorithms to enhance the security and efficiency of CS based data collection in IoT-based WSNs. The proposed scheme operates in five main phases, namely Key Generation, CS-Key Exchange, Data Compression with CS Encryption, Data Aggregation and Encryption with ECC algorithm, and CS Key Re-generation. It considers the benefits of ECC as public key algorithm and CS as encryption and compression method to provide security as well as energy efficiency for cluster based WSNs. Also, it solves the CS- Encryption key distribution problem by introducing a new key sharing method that enables secure exchange of pseudo-random key between the BS and the nodes in a simple way. In addition, a new method is introduced to safeguard the CS scheme from potential security attacks. The efficiency of our proposed technique in terms of security, energy consumption and network lifetime is proved through simulation analysis.Entities:
Mesh:
Year: 2021 PMID: 34914706 PMCID: PMC8675701 DOI: 10.1371/journal.pone.0260634
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations description.
| Notation | Description |
|---|---|
|
| Sensors readings |
|
| Sparse presentation of |
| Φ | Measurement matrix |
|
| Global seed |
|
| Sparse level (number of non zeros values) |
| Ψ | Transform matrix |
|
| Number of round |
| Coefficient vector for node | |
| Θ | |
| Compressed vector for node | |
|
| Measurement vector (compressed samples) |
|
| Elliptic-Curve Cryptography |
|
| ECC Private key |
|
| ECC Public key |
Fig 1ECC Curve [15].
Fig 2The proposed scenario: Two legitimate sides (sensor node and BS) and one malicious side (hacker).
Fig 3Flow chart of the proposed scheme.
Fig 4Procedures for CS-Key exchange phase.
Fig 5Decryption process using correct seed.
Fig 6Decryption process using tiny change in seed value.
Proposed scheme and other related approaches: A comparison.
| Approach | Security technique | CS OTS | Attack Model | Encryption overhead |
|---|---|---|---|---|
| [ | CS encryption | Not considered | Not proposed | |
| [ | CS encryption | Not considered | Not proposed | |
| [ | CS encryption | Not considered | Not proposed | |
| [ | CS based encryption and Public Key | Not considered | Not Proposed | |
| [ | CS encryption | Not considered | Not proposed | |
| [ | CS encryption | Not considered | Not proposed | |
| [ | CS encryption | Not considered | CPA | |
| [ | Public Key | Not considered | CPA, KPA | |
| [ | Public Key | Not Considered | CPA | | |
| Proposed | CS based encryption and Public Key | Achieved | All |
Fig 7FND, HND and LND results.
Fig 8The count of alive nodes versus round.
Fig 9Average energy consumed until FND.
Fig 10Average Energy of Network vs. Rounds.