SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things
Abstract
:1. Introduction
2. Related Work
3. The Proposed Secure and Authentic Sensor Cloud Architecture
3.1. Centroid-Based Cluster Formation Algorithm
3.2. Cloud-Based Data Security Algorithm
4. Network Assumptions and Model
5. Numerical Results
5.1. Network Lifetime
5.2. Packet Drop Ratio
5.3. Energy Consumption
5.4. Average End-to-End Delay
5.5. Transmission Overhead
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Kanumalli, R.S.; Buckel, T.; Preissl, C.; Preyler, P.; Gebhard, A.; Motz, C.; Markovic, J.; Hamidovic, D.; Hager, E.; Pretl, H.; et al. Digitally-intensive transceivers for future mobile communications—Emerging trends and challenges. e & i Elektrotechnik und Informationstechnik 2018, 135, 30–39. [Google Scholar]
- Wiesbaden, S.F. Constantly reliable tools. Atzelektronik Worldw. 2017, 12, 24–27. [Google Scholar] [CrossRef]
- Xiao, H.; Zhang, H.; Wang, Z.; Gulliver, T.A. An RSSI based DV-hop algorithm for wireless sensor networks. In Proceedings of the 2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), Victoria, BC, Canada, 21–23 August 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
- Shinghal, K.; Srivastava, N. Wireless Sensor Networks in Agriculture: For Potato Farming. Available online: https://ssrn.com/abstract=3041375 (accessed on 22 September 2017).
- Zhu, J.; Zou, Y.; Zheng, B. Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access 2017, 5, 5313–5320. [Google Scholar] [CrossRef]
- Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
- Tomić, I.; McCann, J.A. A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 2017, 4, 1910–1923. [Google Scholar]
- Din, I.U.; Guizani, M.; Hassan, S.; Kim, B.S.; Khan, M.K.; Atiquzzaman, M.; Ahmed, S.H. The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 2018, 7, 7606–7640. [Google Scholar] [CrossRef]
- Din, I.U.; Guizani, M.; Kim, B.S.; Hassan, S.; Khan, M.K. Trust management techniques for the Internet of Things: A survey. IEEE Access 2018, 7, 29763–29787. [Google Scholar] [CrossRef]
- Haseeb, K.; Islam, N.; Almogren, A.; Din, I.U. Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things. IEEE Access 2019, 7, 185496–185505. [Google Scholar] [CrossRef]
- Awan, K.A.; Din, I.U.; Almogren, A.; Guizani, M.; Altameem, A.; Jadoon, S.U. Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 2019, 7, 62095–62106. [Google Scholar] [CrossRef]
- Haseeb, K.; Islam, N.; Almogren, A.; Din, I.U.; Almajed, H.N.; Guizani, N. Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs. IEEE Access 2019, 7, 79980–79988. [Google Scholar] [CrossRef]
- Ullah, U.; Khan, A.; Zareei, M.; Ali, I.; Khattak, H.A.; Din, I.U. Energy-effective cooperative and reliable delivery routing protocols for underwater wireless sensor networks. Energies 2019, 12, 2630. [Google Scholar] [CrossRef] [Green Version]
- Din, I.U.; Guizani, M.; Rodrigues, J.J.; Hassan, S.; Korotaev, V.V. Machine learning in the Internet of Things: Designed techniques for smart cities. Future Gener. Comput. Syst. 2019, 100, 826–843. [Google Scholar] [CrossRef]
- Haseeb, K.; Almogren, A.; Islam, N.; Ud Din, I.; Jan, Z. An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN. Energies 2019, 12, 4174. [Google Scholar] [CrossRef] [Green Version]
- Suciu, G.; Suciu, V.; Martian, A.; Craciunescu, R.; Vulpe, A.; Marcu, I.; Halunga, S.; Fratu, O. Big Data, Internet of Things and Cloud Convergence—An Architecture for Secure E-Health Applications. J. Med. Syst. 2015, 39, 141. [Google Scholar] [CrossRef] [PubMed]
- Kocakulak, M.; Butun, I. An overview of Wireless Sensor Networks towards internet of things. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
- Pirbhulal, S.; Zhang, H.; Alahi, E.; Eshrat, M.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.T.; Wu, W. A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 2017, 17, 69. [Google Scholar] [CrossRef] [PubMed]
- He, D.; Chan, S.; Guizani, M. Cyber security analysis and protection of wireless sensor networks for smart grid monitoring. IEEE Wirel. Commun. 2017, 24, 98–103. [Google Scholar] [CrossRef]
- Awan, K.A.; Din, I.U.; Almogren, A.; Guizani, M.; Khan, S. StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks. IEEE Access 2020, 8, 21159–21177. [Google Scholar] [CrossRef]
- Awan, K.A.; Din, I.U.; Zareei, M.; Talha, M.; Guizani, M.; Jadoon, S.U. Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 2019, 7, 52191–52201. [Google Scholar] [CrossRef]
- Khattak, H.A.; Ameer, Z.; Din, U.I.; Khan, M.K. Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities. Comput. Sci. Inf. Syst. 2019, 16, 1–17. [Google Scholar] [CrossRef] [Green Version]
- Sabor, N.; Sasaki, S.; Abo-Zahhad, M.; Ahmed, S.M. A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: Review, taxonomy, and future directions. Wirel. Commun. Mob. Comput. 2017. [Google Scholar] [CrossRef]
- Sohan, R.; Mittal, N.; Singh, U.; Sohi, B.S. An Optimal Tree-Based Routing Protocol Using Particle Swarm Optimization, in Nature Inspired Computing; Springer: Singapore, 2018; pp. 117–124. [Google Scholar]
- Zhan, G.; Shi, W.; Deng, J. Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 2011, 9, 184–197. [Google Scholar] [CrossRef]
- Abuashour, A.; Kadoch, M. Performance improvement of cluster-based routing protocol in VANET. IEEE Access 2017, 5, 15354–15371. [Google Scholar] [CrossRef]
- Anisi, M.H.; Abdul-Salaam, G.; Idris, M.Y.I.; Wahab, A.W.A.; Ahmedy, I. Energy harvesting and battery power based routing in wireless sensor networks. Wirel. Netw. 2017, 23, 249–266. [Google Scholar] [CrossRef]
- Zhang, D.G.; Liu, S.; Zhang, T.; Liang, Z. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J. Netw. Comput. Appl. 2017, 88, 1–9. [Google Scholar]
- Al-Sarawi, S.; Anbar, M.; Alieyan, K.; Alzubaidi, M. Internet of Things (IoT) communication protocols. In Proceedings of the 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan, 17–18 May 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
- Chen, L.; Thombre, S.; Järvinen, K.; Lohan, E.S.; Alén-Savikko, A.; Leppäkoski, H.; Bhuiyan, M.Z.H.; Bu-Pasha, S.; Ferrara, G.N.; Honkala, S.; et al. Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access 2017, 5, 8956–8977. [Google Scholar] [CrossRef]
- Borkar, M.G.; Mahajan, A. A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel. Netw. 2017, 23, 2455–2472. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Yuan, X.; Elhoseny, M.; El-Minir, H.K.; Riad, A.M. A genetic algorithm-based, dynamic clustering method towards improved WSN longevity. J. Netw. Syst. Manag. 2017, 25, 21–46. [Google Scholar] [CrossRef]
- Ali, A.; Ming, Y.; Chakraborty, S.; Iram, S. A comprehensive survey on real-time applications of WSN. Future Internet 2017, 9, 77. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, D.T.; Khan, J.Y.; Ngo, D.T. An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
- Min, E.; Guo, X.; Liu, Q.; Zhang, G.; Cui, J.; Long, J. A survey of clustering with deep learning: From the perspective of network architecture. IEEE Access 2018, 6, 39501–39514. [Google Scholar] [CrossRef]
- Li, H.; Ota, K.; Dong, M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Netw. 2018, 32, 96–101. [Google Scholar] [CrossRef] [Green Version]
- Hammi, M.T.; Livolant, E.; Bellot, P.; Serhrouchni, A.; Minet, P. A lightweight IoT security protocol. In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
- Shahzad, K.M.; Cho, T.H. An energy-aware routing and filtering node (ERF) selection in CCEF to extend network lifetime in WSN. IETE J. Res. 2017, 63, 368–380. [Google Scholar] [CrossRef]
- Cheng, L.; Niu, J.; Cao, J.; Das, S.K.; Gu, Y. QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 1864–1875. [Google Scholar] [CrossRef]
- Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
- Messerli, A.J.; Voccio, P.; Hincher, J.C. Multi-level Cloud Computing System. U.S. Patent 9,563,480, 7 February 2017. [Google Scholar]
- Li, P.; Li, J.; Huang, Z.; Gao, C.Z.; Chen, W.B.; Chen, K. Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 2018, 21, 277–286. [Google Scholar] [CrossRef]
- Zhu, C.; Leung, V.C.; Wang, K.; Yang, L.T.; Zhang, Y. Multi-method data delivery for green sensor-cloud. IEEE Commun. Mag. 2017, 55, 176–182. [Google Scholar] [CrossRef]
- Zhu, C.; Shu, L.; Leung, V.C.; Guo, S.; Zhang, Y.; Yang, L.T. Secure multimedia big data in trust-assisted sensor-cloud for smart city. IEEE Commun. Mag. 2017, 55, 24–30. [Google Scholar] [CrossRef]
- Dinh, T.; Kim, Y. An efficient interactive model for on-demand sensing-as-a-servicesof sensor-cloud. Sensors 2016, 16, 992. [Google Scholar] [CrossRef] [Green Version]
- Abdelwahab, S.; Hamdaoui, B.; Guizani, M.; Znati, T. Cloud of things for sensing-as-a-service: Architecture, algorithms, and use case. IEEE Internet Things J. 2016, 3, 1099–1112. [Google Scholar] [CrossRef]
- Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
- Zhu, C.; Leung, V.C.; Rodrigues, J.J.; Shu, L.; Wang, L.; Zhou, H. Social sensor cloud: Framework, greenness, issues, and outlook. IEEE Netw. 2018, 32, 100–105. [Google Scholar] [CrossRef]
- Thota, C.; Sundarasekar, R.; Manogaran, G.; Varatharajan, R.; Priyan, M.K. Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog Computing: Breakthroughs in Research and Practice; IGI Global: Hershey, PA, USA, 2018; pp. 365–378. [Google Scholar]
- Bozorgchenani, A.; Jahanshahi, M.; Tarchi, D. Gateway selection and clustering in multi-interface wireless mesh networks considering network reliability and traffic. Trans. Emerg. Telecommun. Technol. 2018, 29, e3215. [Google Scholar] [CrossRef]
- Dahnil, D.P.; Singh, Y.P.; Ho, C.K. Topology-controlled adaptive clustering for uniformity and increased lifetime in wireless sensor networks. IET Wirel. Sens. Syst. 2012, 2, 318–327. [Google Scholar] [CrossRef]
- Darabkh, K.A.; Albtoush, W.Y.; Jafar, I.F. Improved clustering algorithms for target tracking in wireless sensor networks. J. Supercomput. 2017, 73, 1952–1977. [Google Scholar] [CrossRef]
- Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; IEEE: Piscataway, NJ, USA, 2000. [Google Scholar]
- Wang, J.; Zheng, L.; Zhao, L.; Tian, D. LEACH-based security routing protocol for WSNs. In Advances in Computer Science and Information Engineering; Springer: Berlin/Heidelberg, Germany, 2012; pp. 253–258. [Google Scholar]
- Faheem, M.; Gungor, V.C. Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0. Appl. Soft Comput. 2018, 68, 910–922. [Google Scholar] [CrossRef]
- Eschenauer, L.; Gligor, V.D. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 18–22 November 2002; ACM: New York, NY, USA, 2002. [Google Scholar]
- Gidijala, N.S.; Datla, S.; Joshi, R.C. A robust trust mechanism algorithm for secure power aware AODV routing in mobile Ad hoc networks. In Proceedings of the International Conference on Contemporary Computing, Noida, India, 9–11 August 2010. [Google Scholar]
- Nasser, N.; Chen, Y. Secure multipath routing protocol for wireless sensor networks. In Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW’07), Toronto, ON, Canada, 22–29 June 2007; IEEE: Piscataway, NJ, USA, 2007. [Google Scholar]
- Chatterjee, K.; De, A.; Gupta, D. A secure and efficient authentication protocol in wireless sensor network. Wirel. Pers. Commun. 2015, 81, 17–37. [Google Scholar] [CrossRef]
- Mehmood, A.; Khanan, A.; Umar, M.M.; Abdullah, S.; Ariffin, K.A.Z.; Song, H. Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 2017, 6, 5688–5694. [Google Scholar] [CrossRef]
- Dinh, N.T.; Kim, Y. An efficient on-demand latency guaranteed interactive model for sensor-cloud. IEEE Access 2018, 6, 68596–68611. [Google Scholar] [CrossRef]
- Kelsey, J.; Schneier, B.; Wagner, D.; Hall, C. Cryptanalytic attacks on pseudorandom number generators. In International Workshop on Fast Software Encryption; Springer: Berlin/Heidelberg, Germany, 1998. [Google Scholar]
- Mishra, M.; Mankar, V. Text encryption algorithms based on pseudo random number generator. Int. J. Comput. Appl. 2015, 111, 1–6. [Google Scholar] [CrossRef]
- Likas, A.; Vlassis, N.; Verbeek, J.J. The global k-means clustering algorithm. Pattern Recognit. 2003, 36, 451–461. [Google Scholar] [CrossRef] [Green Version]
- Poolsappasit, N.; Kumar, V.; Madria, S.; Chellappan, S. Challenges in secure sensor-cloud computing. In Workshop on Secure Data Management; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Alamri, A.; Ansari, W.S.; Hassan, M.M.; Hossain, M.S.; Alelaiwi, A.; Hossain, M.A. A survey on sensor-cloud: Architecture, applications, and approaches. Int. J. Distrib. Sens. Netw. 2013, 9, 917923. [Google Scholar] [CrossRef]
- Zhou, X.; Tang, X. Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of the 2011 6th International Forum on Strategic Technology, Harbin, China, 22–24 August 2011. [Google Scholar]
Factor | Value |
---|---|
Number of malicious nodes | 10 |
Transport layer protocol | UDP |
50 nJ/ bit | |
10 nJ/bit/m2 | |
0.0013 pJ/bit/m4 | |
Packet size, k | 20 bits |
Payload size | 512 bytes |
Initial energy | 5 J |
α, β | 0.5, 0.5 |
Nodes transmission range | 20 m |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Haseeb, K.; Almogren, A.; Ud Din, I.; Islam, N.; Altameem, A. SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things. Sensors 2020, 20, 2468. https://doi.org/10.3390/s20092468
Haseeb K, Almogren A, Ud Din I, Islam N, Altameem A. SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things. Sensors. 2020; 20(9):2468. https://doi.org/10.3390/s20092468
Chicago/Turabian StyleHaseeb, Khalid, Ahmad Almogren, Ikram Ud Din, Naveed Islam, and Ayman Altameem. 2020. "SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things" Sensors 20, no. 9: 2468. https://doi.org/10.3390/s20092468
APA StyleHaseeb, K., Almogren, A., Ud Din, I., Islam, N., & Altameem, A. (2020). SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things. Sensors, 20(9), 2468. https://doi.org/10.3390/s20092468