Skip to main content

A Secure Topology Control Mechanism for SDWSNs Using Identity-Based Cryptography

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

As one of the most critical procedures of Software-Defined Wireless Sensor Networks (SDWSNs), topology control is used to maintain the global view of the network. However, the security issues of SDWSNs are still in infancy. Due to the open wireless channels, the malicious node could tamper, steal or insert the information of topology messages and then cause huge damage on the network operations. Compared with the traditional cryptography, Identity-based Cryptography (IBC) may be more suitable for SDWSNs with its ability to derive the public key from node identity directly. Specifically, an Identity-based Combined Encryption and Signature Cryptography (IBCES) can use the same identity to encrypt and sign the message. Based on IBCES, we design a neighbor discovery and secure communication mechanism using a mutual authentication scheme. And then we propose a secure topology control mechanism to protect data confidentiality, integrity and authentication during the topology collection and management processes. Finally, the security analysis indicates that our scheme meets the basic security requirements of topology messages and resists multiple attacks. The performance analysis and experiment results support that our approach is suitable for SDWSNs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alves, R.C., Oliveira, D.A., Pereira, G.C., Albertini, B.C., Margi, C.B.: WS\(^3\)N: wireless secure SDN-based communication for sensor networks. Secur. Commun. Netw. (2018)

    Google Scholar 

  2. Anggorojati, B., Prasad, R.: Securing communication in inter domains Internet of Things using identity-based cryptography. In: International Workshop on Big Data and Information Security, pp. 137–142 (2017)

    Google Scholar 

  3. Chen, S., Ma, M., Luo, Z.: An authentication scheme with Identity-based cryptography for M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)

    Article  Google Scholar 

  4. Galluccio, L., Milardo, S., Morabito, G., Palazzo, S.: SDN-WISE: design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 513–521 (2015)

    Google Scholar 

  5. Ishmanov, F., Bin Zikria, Y.: Trust mechanisms to secure routing in wireless sensor networks: current state of the research and open research issues. J. Sensors (2017)

    Google Scholar 

  6. Karantaidou, I., Halkidis, S.T., Petridou, S., Mamatas, L., Stephanides, G.: Pairing-based cryptography on the Internet of Things: a feasibility study. In: Chowdhury, K.R., Di Felice, M., Matta, I., Sheng, B. (eds.) WWIC 2018. LNCS, vol. 10866, pp. 219–230. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02931-9_18

    Chapter  Google Scholar 

  7. Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872–1899 (2017)

    Article  Google Scholar 

  8. McCusker, K., O’Connor, N.E.: Low-energy symmetric key distribution in wireless sensor networks. IEEE Trans. Dependable Secure Comput. 8(3), 363–376 (2010)

    Article  Google Scholar 

  9. Oliveira, L.B.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485–493 (2011)

    Article  Google Scholar 

  10. Pritchard, S.W., Hancke, G.P., Abu-Mahfouz, A.M.: Cryptography methods for software-defined wireless sensor networks. In: IEEE 27th International Symposium on Industrial Electronics, pp. 1257–1262 (2018)

    Google Scholar 

  11. Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the Internet of Things. In: IEEE Symposium on Computers and Communication, pp. 1109–1111 (2016)

    Google Scholar 

  12. Theodorou, T., Mamatas, L.: Software defined topology control strategies for the Internet of Things. In: IEEE Conference on Network Function Virtualization and Software Defined Networks, pp. 236–241 (2017)

    Google Scholar 

  13. Stanford University. PBC Library (2013). https://crypto.stanford.edu/pbc/

  14. Wang, M., Liu, J., Chen, J., Liu, X., Mao, J.: Perm-guard: authenticating the validity of flow rules in software defined networking. J. Signal Process. Syst. 86(2–3), 157–173 (2017)

    Article  Google Scholar 

  15. Wang, R., Zhang, Z., Zhang, Z., Jia, Z.: ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput. Netw. 139, 119–135 (2018)

    Article  Google Scholar 

  16. Han Yanan and Li fagen: Research on combined public key cryptographic scheme for smart grid. J. Cryptol. Res. 3(4), 340–351 (2016)

    Google Scholar 

  17. Zhou, Y., Li, Z., Hu, F., Li, F.: Identity-based combined public key schemes for signature, encryption, and signcryption. In: Chandra, P., Giri, D., Li, F., Kar, S., Jana, D.K. (eds.) Inf. Technol. Appl. Math. AISC, vol. 699, pp. 3–22. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-7590-2_1

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was sponsored by the project of State Grid Shandong Electric Power Company Science and Technology Program No. 520615200006.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, R., Liu, D., Chen, J., Ma, L., Liu, X., Zhang, H. (2020). A Secure Topology Control Mechanism for SDWSNs Using Identity-Based Cryptography. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics