Abstract
The Compressive Sensing (CS) technique based solutions are increasingly finding application in the field of IoV and WSNs motivated by the benefits of concurrent implementation of lightweight encryption and compression, which offers security and enhancement of WSN lifetime. The CS based solutions still face certain major challenging issues concerned with Key Distribution and Chosen Plain-Text Attacks (CPA). We introduce in this paper, a lightweight framework by instigating a scheme that generates and exchanges the key between the WSN nodes and the BS with the objective of enhancing security and efficiency. It enhances the security by resisting the Chosen Plaintext Attack using the newly introduced algorithm, “Data Compression with Encryption”, which allows the WSN nodes to use a secret value for generating secret compressed samples. Furthermore Mobile Distributed Clustering Algorithm (MDCA) which is based on the use of predicted combined criteria metric is proposed for node clustering. The simulation results using experimentally collected data from real sensors placed at Intel Berkeley Research Lab show that the introduced scheme decrypts data with a small error in case of real user with correct seed, however, the decryption of the same data by an adversary produces the resultant data with considerably larger error. Moreover, the proposed framework succeeds to prolong the WSN lifetime when compared to other encryption algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu, X., Yang, Q., Luo, J., Ding, B., Zhang, S.: An energy-aware offloading framework for edge-augmented mobile RFID systems. IEEE Internet Things J. 6, 3994–4004 (2018)
Zheng, J., Simplot-Ryl, D., Bisdikian, C., Mouftah, H.T.: The internet of things. IEEE Commun. Mag. 49, 30–31 (2011)
Palopoli, L., Passerone, R., Rizano, T.: Scalable offline optimization of industrial wireless sensor networks. IEEE Trans. Ind. Inf. 7(2), 328–329 (2011)
Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circuits Syst. 3(1), 45–54 (2013)
Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., Nolazco-Flores, J.: On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks. Sensors 15(4), 7619–7649 (2015)
Mollin, R.A.: An Introduction to Cryptography. CRC Press, Boca Raton (2006)
Vanstone, S.A., Menezes, A.J., Orschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1999)
Fragkiadakis, A., Tragos, E., Traganitis, A.: Lightweight and secure encryption using channel measurements. In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace, Aalborg, pp. 1–5 (2014)
Zhang, Y., Xiang, Y., Zhang, L.Y., Rong, Y., Guo, S.: Secure wireless communications based on compressive sensing: a survey. IEEE Commun. Surv. Tutor. 21, 1093–1111 (2018)
Zhang, Y., Xiang, Y., Zhang, L.Y.: In Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT. Springer, Singapore (2019)
Zhang, L., Wong, K., Li, C., Zhang, Y.: Towards secure compressive sampling scheme. CoRR (2014)
Fragkiadakis, A., Kovacevic, L., Tragos, E.: Enhancing compressive sensing encryption in constrained devices using chaotic sequences. In: Proceedings of the 2nd Workshop on Experiences in the Design and Implementation of Smart Objects, pp. 17–22 (2016)
Aziz, A., Singh, K.: Lightweight security scheme for internet of things. Wirel. Pers. Commun. 104(2), 577–593 (2019)
Tragos, E., et al.: Enabling reliable and secure IoT-based smart city applications. In: Proceedings of PERCOM, pp. 111–116 (2014)
Abdallah, W., Boudriga, N., Kim, D.: An efficient and scalable key management mechanism for wireless sensor networks. In: 17th International Conference on ICACT, India. IEEE (2015)
Othman, S.B., Bahattab, A.A., Trad, A., Youssef, H.: Confidentiality and integrity for data aggregation in WSN using homomorphic encryption. Wirel. Pers. Commun. 80, 867–889 (2015)
Suganthi, N., Vembu, S.: Energy efficient key management scheme for wireless sensor networks. Int. J. Comput. Commun. Control 9, 71–78 (2014)
Kadri, B., Feham, M., Mhammed, A.: Efficient and secured ant routing algorithm for wireless sensor networks. Int. J. Netw. Secur. 16, 149–156 (2014)
Geetha, R., Kannan, E.: A hybrid key management approach for secure communication in wireless sensor networks. Indian J. Sci. Technol. 8, 654–659 (2015)
Boubiche, D.E., Boubiche, S., Bilami, A.: A cross-layer watermarking-based mechanism for data aggregation integrity in heterogeneous WSNs. IEEE Commun. Lett. 19, 823–826 (2015)
Roy, S., Karjeea, J., Rawata, U.S., Pratik, D., Deyb, N.: Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks. Procedia Comput. Sci. 78, 408–414 (2016)
Luo, C., Wu, F., Sun, J., Chen, C.: Compressive data gathering for large-scale wireless sensor networks, pp. 145–156. ACM (2009)
Hu, P., Xing, K., Cheng, X., Wei, H., Zhu, H.: Information leaks out: attacks and countermeasures on compressive data gathering in wireless sensor networks, pp. 1258–1266. IEEE (2014)
Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)
Cossalter, M., Valenzise, G., Tagliasacchi, M., Tubaro, S.: Joint compressive video coding and analysis. IEEE Trans. Multimed. 12(3), 168–183 (2010)
Premnath, S., et al.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)
Li, Z., Xu, W., Miller, R., Trappe, W.: Securing wireless systems via lower layer enforcements. In: Proceedings of WiSe, pp. 33–42 (2006)
Dautov, R., Tsouri, G.: Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In: Proceedings of ICNC, pp. 354–358 (2013)
Fragkiadakis, A., Tragos, E., Makrogiannakis, A., Papadakis, S., Charalampidis, P., Surligas, M.: Signal processing techniques for energy efficiency, security, and reliability in the IoT domain. In: Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M. (eds.) Internet of Things (IoT) in 5G Mobile Technologies. MOST, vol. 8, pp. 419–447. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30913-2_18
Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of Allerton Conference on Communication, Control, and Computing, pp. 813–817 (2008)
Cambareri, V., Mangia, M., Pareschi, F., Rovatti, R., Setti, G.: Low-complexity multiclass encryption by compressed sensing. IEEE Trans. Signal Process. 63, 2183–2195 (2015)
Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 813–817 (2008)
Zhang, Y., et al.: Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Internet Things J. 5, 3442–3451 (2017)
Xue, W., Luo, C., Lan, G., Rana, R.K., Hu, W., Seneviratne, A.: Kryptein: a compressive-sensing-based encryption scheme for the internet of things. In: Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 169–180 (2017)
Pudi, V., Chattopadhyay, A., Lam, K.-Y.: Secure and lightweight compressive sensing using stream cipher. IEEE Trans. Circuits Syst. II Express Briefs 65(3), 371–375 (2018)
George, S.N., Pattathil, D.P.: A secure LFSR based random measurement matrix for compressive sensing. Sens. Imaging 15(1), 1–29 (2014)
Dautov, R., Tsouri, G.R.: Establishing secure measurement matrix for compressed sensing using wireless physical layer security. In: International Conference on Computing, Networking and Communications (ICNC), pp. 354–358. IEEE (2013)
Chai, X., Gan, Z., Chen, Y., Zhang, Y.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35–51 (2017)
Zhang, P., Wang, S., Guo, K., Wang, J.: A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 70, 73–84 (2018)
Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, Cambridge (1999)
Tropp, J., Gilber, A.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 53(14), 4655–4666 (2007)
Abo-Zahhad, M., Farrag, M., Ali, A., Amin, O.: An energy consumption model for wireless sensor networks. In: International Conference on Energy Aware Computing Systems & Applications (ICEAC), pp. 1–4. IEEE (2015)
Liu, H., Zhu, Z., Jiang, H., Wang, B.: A novel image encryption algorithm based on improved 3D chaotic cat map. In: The 9th International Conference for Young Computer Scientists (2008)
Intel Berkeley Research Lab Data Set (2018). http://db.csail.mit.edu/labdata/labdata.html. Accessed 9 Apr
Aziz, A., Singh, K., Osamy, W., et al.: An efficient compressive sensing routing scheme for internet of things based wireless sensor networks. Wirel. Pers. Commun. 114, 1905–1925 (2020). https://doi.org/10.1007/s11277-020-07454-4
Aziz, A., Salim, A., Osamy, W.: Adaptive and efficient compressive sensing based technique for routing in wireless sensor networks. In: Proceedings of INTHITEN (IoT and its Enablers) Conference, pp. 3–4 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Aziz, A., Ibrahim, M. (2023). Energy Efficient and Secure Scheme Based Compressive Sensing Method for Internet of Vehicles. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-30258-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30257-2
Online ISBN: 978-3-031-30258-9
eBook Packages: Computer ScienceComputer Science (R0)