Cargando…

Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks

The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Liang, Chen, Wen, Li, Tao, Liu, Yuling
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603733/
https://www.ncbi.nlm.nih.gov/pubmed/31146365
http://dx.doi.org/10.3390/s19112452
_version_ 1783431573651062784
author Liu, Liang
Chen, Wen
Li, Tao
Liu, Yuling
author_facet Liu, Liang
Chen, Wen
Li, Tao
Liu, Yuling
author_sort Liu, Liang
collection PubMed
description The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs.
format Online
Article
Text
id pubmed-6603733
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66037332019-07-17 Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks Liu, Liang Chen, Wen Li, Tao Liu, Yuling Sensors (Basel) Article The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs. MDPI 2019-05-29 /pmc/articles/PMC6603733/ /pubmed/31146365 http://dx.doi.org/10.3390/s19112452 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Liu, Liang
Chen, Wen
Li, Tao
Liu, Yuling
Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title_full Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title_fullStr Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title_full_unstemmed Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title_short Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks
title_sort pseudo-random encryption for security data transmission in wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6603733/
https://www.ncbi.nlm.nih.gov/pubmed/31146365
http://dx.doi.org/10.3390/s19112452
work_keys_str_mv AT liuliang pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks
AT chenwen pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks
AT litao pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks
AT liuyuling pseudorandomencryptionforsecuritydatatransmissioninwirelesssensornetworks