How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
The Effects of XML Compression on SOAP Performance
World Wide Web
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Optimized web service architecture for 6LoWPAN
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Micro Secure Socket Layer for Micro Server
ICFN '10 Proceedings of the 2010 Second International Conference on Future Networks
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
The web of things vision: Things as a service and interaction patterns
Bell Labs Technical Journal
Research challenges and perspectives on Wisdom Web of Things (W2T)
The Journal of Supercomputing
Hi-index | 0.00 |
In the paradigms of the Internet of Things (IoT) as well as the evolving Web of Things (WoT) and the emerging Wisdom Web of Things (W2T), not only can the data collected by the sensor nodes (i.e., the things) in the wireless sensor networks (WSNs) be transmitted to and processed at Internet nodes and subsequently transformed into information, knowledge, wisdom and eventually into services to serve humans, but human users can also access, control and manage the sensor nodes in the WSNs through nodes in the Internet. Since data are the basis for enabling applications and services in W2T, it becomes imperative that enabling technologies for end-to-end security be developed to secure data communication between Internet user nodes and sensor server nodes to protect the exchange of data. However, traditional security protocols developed for the Internet rely mostly on symmetric authentication and key management based on public key algorithms, thus are deemed to be unsuitable for WSNs due to resource constraints in the sensor nodes. Specifically, acting as the server nodes in this scenario, sensor nodes cannot take on the heavy duty like regular servers in the Internet. Meanwhile, current security mechanisms developed for WSNs have mainly focused on the establishment of keys between neighboring nodes at the link layer and thus are not considered to be effective for end-to-end security in the W2T scenario. In this paper, we propose an end-to-end secure communication scheme for W2T in WSNs in which we follow an asymmetric approach for authentication and key management using signcryption and symmetric key encryption. In our proposed scheme, a great part of the work for authentication and access control is shifted to a gateway between a WSN and the Internet to reduce the burden and energy consumption in the sensor nodes. In addition, our scheme can ensure the privacy of user identities and key negotiation materials, and denial of service (DoS) attacks targeted at the sensor nodes can be effectively blocked at the gateway. We will also conduct quantitative analysis and an experiment to show that our proposed scheme can enhance the effectiveness of end-to-end security while reducing the cost of sensor nodes in terms of computation, communication and storage overhead as well as the latency of handshaking compared to similar schemes that are based on Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.