Cargando…
Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603733/ https://www.ncbi.nlm.nih.gov/pubmed/31146365 http://dx.doi.org/10.3390/s19112452 |
_version_ | 1783431573651062784 |
---|---|
author | Liu, Liang Chen, Wen Li, Tao Liu, Yuling |
author_facet | Liu, Liang Chen, Wen Li, Tao Liu, Yuling |
author_sort | Liu, Liang |
collection | PubMed |
description | The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs. |
format | Online Article Text |
id | pubmed-6603733 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66037332019-07-17 Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks Liu, Liang Chen, Wen Li, Tao Liu, Yuling Sensors (Basel) Article The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs. MDPI 2019-05-29 /pmc/articles/PMC6603733/ /pubmed/31146365 http://dx.doi.org/10.3390/s19112452 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Liu, Liang Chen, Wen Li, Tao Liu, Yuling Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title | Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title_full | Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title_fullStr | Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title_full_unstemmed | Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title_short | Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks |
title_sort | pseudo-random encryption for security data transmission in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603733/ https://www.ncbi.nlm.nih.gov/pubmed/31146365 http://dx.doi.org/10.3390/s19112452 |
work_keys_str_mv | AT liuliang pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks AT chenwen pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks AT litao pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks AT liuyuling pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks |