A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Abstract
:1. Introduction
2. Related Work
3. Security Requirements in IoT Based Home Automation Using WSNs
3.1. Authentication
3.2. Trustworthiness
3.3. Data Freshness
3.4. Confidentiality and Privacy
3.5. Secure Localization
3.6. Integrity
3.7. Non-Repudiation
3.8. Availability
3.9. Access Control
4. Method and Implementation
4.1. Secured IoT-Based System
4.2. Proposed TBSA Security Method
4.3. Security Analysis
4.3.1. Network Security Requirements Accomplishment
4.3.2. Data Security Requirements Accomplishment
4.4. Energy Consumption Calculation
5. Experiment Results and Discussion
5.1. Temperature Measurement
5.2. TBSA Encryption
5.3. Energy Consumption Comparison
6. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Ghayvat, H.; Mukhopadhyay, S.; Liu, J.; Babu, A.; Alahi, M.E.E.; Gui, X. Internet of things for smart homes and buildings. Aust. J. Telecommun. Digit. Econ. 2015, 3, 33–47. [Google Scholar] [CrossRef]
- He, D.; Chan, S.; Guizani, M.; Yang, H.; Zhou, B. Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1129–1139. [Google Scholar] [CrossRef]
- Ghormare, S.; Sahare, V. Implementation of data confidentiality for providing high security in wireless sensor network. In Proceedings of the 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 19–20 March 2015.
- Ghayvat, H.; Liu, J.; Mukhopadhyay, S.C.; Gui, X. Wellness sensor networks: A proposal and implementation for smart home for assisted living. IEEE Sens. J. 2015, 15, 7341–7348. [Google Scholar] [CrossRef]
- Venkatasubramanian, K.K.; Banerjee, A.; Gupta, S.K.S. Pska: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 60–68. [Google Scholar] [CrossRef] [PubMed]
- Poon, C.C.Y.; Zhang, Y.T.; Bao, S.D. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag. 2006, 44, 73–81. [Google Scholar] [CrossRef]
- Zinonos, Z.; Vassiliou, V. Inter-Mobility support in controlled 6LoWPAN networks. In Proceedings of the 2010 IEEE Globecom Workshops, Miami, FL, USA, 5–10 December 2010.
- Jiang, Y.; Zhang, L.; Wang, L. Wireless sensor networks and the internet of things. Int. J. Distrib. Sens. Netw. 2013, 2013, 1578–1584. [Google Scholar] [CrossRef]
- Ghaleb, S.M.; Subramaniam, S.; Zukarnain, Z.A.; Muhammed, A. Mobility management for IoT: A survey. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1–25. [Google Scholar] [CrossRef]
- Li, J.; Zhang, Y.; Chen, Y.-F.; Nagaraja, K.; Li, S.; Raychaudhuri, D. A mobile phone based WSN infrastructure for IoT over future internet architecture. In Proceedings of the IEEE International Conference on and IEEE Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013.
- Sana, J.H.; Imran, J.A.; Andew, K.H. Light-weight framework for security-sensitive wireless sensor networks applications. IET Wirel. Sens. Syst. 2013, 3, 298–306. [Google Scholar]
- Mondal, B.; Priyadarshi, A.; Hariharan, D. An improved cryptography scheme for secure image communication. Int. J. Comput. Appl. 2013, 67, 23–27. [Google Scholar] [CrossRef]
- Roman, R.; Alcaraz, C.; Lopez, J.; Sklavos, N. Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 2011, 37, 147–159. [Google Scholar] [CrossRef]
- Mandal, S.; Chaki, R. A secure encryption logic for communication in wireless sensor networks. Int. J. Cryptogr. Inf. Secur. 2012, 2, 78–82. [Google Scholar] [CrossRef]
- Dargie, W. Dynamic power management in wireless sensor networks: State-of-the-art. IEEE Sens. J. 2012, 12, 1518–1528. [Google Scholar] [CrossRef]
- Castagnetti, A.; Pegatoquet, A.; Le, T.N.; Auguin, M. A joint duty-cycle and transmission power management for energy harvesting WSN. IEEE Trans. Ind. Inform. 2014, 10, 928–936. [Google Scholar] [CrossRef]
- Ahmed, N.; Rahman, H.; Hussain, M.I. A comparison of 802.11 AH and 802.15. 4 for IoT. ICT Express 2016, 2, 100–102. [Google Scholar] [CrossRef]
- Antonio, G.; Ruzzelli, A.; Giancarlo, F.; Antonio, G.R.; Gregory, O.H. A WSN-based building management framework to support energy-saving applications in buildings. Adv. Distrib. Comput. Internet Technol. Trends Issues 2011, 1, 161–174. [Google Scholar]
- Rashidi, P.; Cook, D.J. Com: A method for mining and monitoring human activity patterns in home-based health monitoring systems. ACM Trans. Intell. Syst. Technol. 2013, 4, 64. [Google Scholar] [CrossRef]
- Cicirelli, F.; Fortino, G.; Giordano, A.; Guerrieri, A.; Spezzano, G.; Vinci, A. On the design of smart homes: A framework for activity recognition in home environment. J. Med. Syst. 2016, 40, 1–17. [Google Scholar] [CrossRef] [PubMed]
- Granjal, J.; Edmundo, M.; Jorge, S.S. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Hennebert, C.; Dos Santos, J. Security protocols and privacy issues into 6LoWPAN stack: A synthesis. IEEE Inter. Things J. 2014, 1, 384–398. [Google Scholar] [CrossRef]
- Raza, S.; Voigt, T.; Jutvik, V. Lightweight IKEv2: A key management solution for both the compressed ipsec and the IEEE 802.15. 4 security. In Proceedings of the IETF Workshop on Smart Object Security, Paris, France, 23 March 2012.
- Kasraoui, M.; Cabani, A.; Chafouk, H. Ikev2 authentication exchange model in ns-2. In Proceedings of the 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, Taiwan, 10–12 June 2014.
- Rghioui, A.; Bouhorma, M.; Benslimane, A. Analytical study of security aspects in 6lowpan networks. In Proceedings of the 5th International Conference Information and Communication Technology for the Muslim World (ICT4M), Rabat, Morocco, 26–27 March 2013.
- Aakash, D.; Shanthi, P. Lightweight security algorithm for wireless node connected with IoT. Indian J. Sci. Technol. 2016, 9, 1–8. [Google Scholar] [CrossRef]
- Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.; Fang, L.; He, Z.; Lin, S.; Stankovic, J. Alarm-net: Wireless sensor networks for assisted-living and residential monitoring. Univ. Va. Comput. Sci. Dep. Tech. Rep. 2006, 2, 1–14. [Google Scholar]
- Gope, P.; Hwang, T. Bsn-care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 2016, 16, 1368–1376. [Google Scholar] [CrossRef]
- Dobbertin, H. Cryptanalysis of MD4. In Proceedings of the International Workshop on Fast Software Encryption, Cambridge, UK, 21–23 February 1996.
- Deepakumara, J.; Heys, H.M.; Venkatesan, R. Fpga implementation of MD5 hash algorithm. In Proceedings of the Canadian Conference on Electrical and Computer Engineering, Toronto, ON, Canada, 13–16 May 2001.
- Zibin, D.; Ning, Z. Fpga implementation of SHA-1 algorithm. In Proceedings of the 5th IEEE International conference on ASIC, Beijing, China, 21–24 October 2003.
- Bellare, M.; Canetti, R.; Krawczyk, H. Message authentication using hash functions: The hmac construction. RSA Lab. CryptoBytes 1996, 2, 12–15. [Google Scholar]
- Horta, E.L.; Lockwood, J.W.; Taylor, D.E.; Parlour, D. Dynamic hardware plugins in an fpga with partial run-time reconfiguration. In Proceedings of the 39th annual Design Automation Conference, New Orleans, LA, USA, 10–14 June 2002.
- Mandal, A.K.; Parakash, C.; Tiwari, A. Performance evaluation of cryptographic algorithms: Des and aes, Electrical. In Proceedings of the 2012 IEEE Students’ Conference on Electronics and Computer Science (SCEECS), Bhopal, India, 1–2 March 2012.
- Chang, D.; Gupta, K.C.; Nandi, M. Rc4-hash: A new hash function based on RC4. In Proceedings of the International Conference on Cryptology, Kolkata, India, 11–13 December 2006.
- Schneier, B. Description of a new variable-length key, 64-bit block cipher (blowfish). In Proceedings of the International Workshop on Fast Software Encryption, Cambridge, UK, 9–11 December 1993.
- Mian, J.; Priyadarsi, N.; Muhammad, U.; Xiangjian, H. PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 2016, 1, 1–10. [Google Scholar]
- Nia, A.M.; Jha, N.K. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 2016, 1, 1–21. [Google Scholar]
- Sicari, S.; Alessandra, R.; Luigi, A.G.; Alberto, C.P. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Jing, Q.; Athanasios, V.V.; Wan, J.; Lu, J.; Qiu, D. Security of the internet of things: Perspectives and challenges. Wirel. Netw. 2014, 8, 2481–2501. [Google Scholar] [CrossRef]
S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
---|---|---|
1 | Proposed TBSA | 0.20 |
2 | MD4 | 0.52 |
3 | MD5 | 0.59 |
4 | SHA-1 | 0.76 |
5 | HMAC | 1.16 |
S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
---|---|---|
1 | Proposed TBSA | 0.20 |
2 | RC4 | 0.49 |
3 | Blowfish | 0.81 |
4 | AES | 1.20 |
5 | DES | 2.80 |
S. NO | Technique/Method | Energy Consumption (Micro Joule/Byte) |
---|---|---|
1 | Proposed TBSA | 0.20 |
2 | PAWN | 0.36 |
3 | PRESENT-GRP | 0.47 |
4 | Alarm-Net | 0.53 |
© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pirbhulal, S.; Zhang, H.; E Alahi, M.E.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.-T.; Wu, W. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network. Sensors 2017, 17, 69. https://doi.org/10.3390/s17010069
Pirbhulal S, Zhang H, E Alahi ME, Ghayvat H, Mukhopadhyay SC, Zhang Y-T, Wu W. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network. Sensors. 2017; 17(1):69. https://doi.org/10.3390/s17010069
Chicago/Turabian StylePirbhulal, Sandeep, Heye Zhang, Md Eshrat E Alahi, Hemant Ghayvat, Subhas Chandra Mukhopadhyay, Yuan-Ting Zhang, and Wanqing Wu. 2017. "A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network" Sensors 17, no. 1: 69. https://doi.org/10.3390/s17010069
APA StylePirbhulal, S., Zhang, H., E Alahi, M. E., Ghayvat, H., Mukhopadhyay, S. C., Zhang, Y. -T., & Wu, W. (2017). A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network. Sensors, 17(1), 69. https://doi.org/10.3390/s17010069