Abstract
The sensed data from Internet of Things (IoT) devices are important for accurate decision making. Thus, the data integrity, non-repudiation, data confidentiality, data freshness, etc., are necessary requirements in sensor-based IoT networks. Further, the IoT devices are resource constrained in terms of computation and communication capabilities. Hence, striking a balance between network lifetime and data security is of utmost importance. The present work explores the sensor-based IoT-specific security threats like, data modification, selective forwarding and replay attacks. Further, a scheme is proposed based on secret sharing and cryptographic hash functions which detects these attacks by a malicious entity and protects the data from passive listeners too. Extensive simulations were performed to evaluate the efficacy of the scheme, and results show that the proposed scheme outperforms previously explored schemes like SIGN-share, SHAM-share, and PIP algorithm, in terms of sensor processing time, energy consumption during in-node processing and aggregation time. Network lifetime has been further analyzed to show the efficacy of the scheme.




Similar content being viewed by others
References
Shivhare A, Singh VK, Kumar M (2020) Anticomplementary triangles for efficient coverage in sensor network-based IoT. IEEE Syst J 14(4):4854
Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36
Kirimtat A, Krejcar O, Kertesz A, Tasgetiren MF (2020) Future trends and current state of smart city concepts: a survey. IEEE access 8:86448
Al-Turjman F, Alturjman S (2018) Confidential smart-sensing framework in the IoT era. J Supercomput 74(10):5187
Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22(2):1121
Satpathy S, Mohan P, Das S, Debbarma S (2020) A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. J Supercomput 76(8):5849
Rathee G, Garg S, Kaddoum G, Choi BJ (2020) Decision-making model for securing IoT devices in smart industries. IEEE Trans Industr Inf 17(6):4270
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of threats? a survey of practical security vulnerabilities in real IoT devices,. IEEE Int Things J 6(5):8182
Sharma M, Tandon A, Narayan S, Bhushan B (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey, In 2017 3rd international conference on advances in computing, communication & automation (ICACCA)(Fall) (IEEE), pp. 1–5
Marigowda C, Thriveni J, Gowrishankar S, Venugopal K (2018) An efficient secure algorithms to mitigate DoS, replay and jamming attacks in wireless sensor network, In: Proceedings of the world congress on engineering and computer science, vol. 1
Choi J, Bang J, Kim L, Ahn M, Kwon T (2015) Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst J 11(2):494
Zhou L, Ge C, Hu S, Su C (2019) Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks. IEEE Int Things J 7(5):3948
Jose J, Princy M, Jose J (2013) PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks, In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN) (IEEE), pp. 330–336
Zhou Q, Yang G, He L (2014) An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int J Distrib Sens Netw 10(1):962925
Elshrkawey M, Al-Mahdi H (2021) Sda-sm: an efficient secure data aggregation scheme using separate mac across wireless sensor networks, International Journal of Computers. Commun Control 16(2):1
Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in wsns, In 2017 IEEE wireless communications and networking conference (WCNC) (IEEE), pp 1–6
Yousefpoor MS, Yousefpoor E, Barati H, Barati A, Movaghar A, Hosseinzadeh M (2021) Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review. J Netw Comput Appl 190:103118
Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps, In: International conference on the theory and applications of cryptographic techniques (Springer, 2003), pp 416–432
Kumar V, Madria S (2013) Pip: Privacy and integrity preserving data aggregation in wireless sensor networks, In: 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (IEEE), pp 10–19
Alghamdi W, Rezvani M, Wu H, Kanhere SS (2019) Routing-aware and malicious node detection in a concealed data aggregation for WSNs. ACM Trans Sensor Netw(TOSN) 15(2):1
Tang W, Ren J, Deng K, Zhang Y (2019) Secure data aggregation of lightweight E-healthcare IoT devices with fair incentives. IEEE Internet Things J 6(5):8714
Haseeb K, Islam N, Almogren A, Din IU, Almajed HN, Guizani N (2019) Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7:79980
Pang LJ, Wang YM (2005) A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl Math Comput 167(2):840
Saez Y, Estebanez C, Quintana D, Isasi P (2019) Evolutionary hash functions for specific domains. Appl Soft Comput 78:58
Rasjid ZE, Soewito B, Witjaksono G, Abdurachman E (2017) Evolutionary hash functions for specific domains. Procedia Comput Sci 116:381
Su Y, Gao Y, Kavehei O, Ranasinghe DC (2019) Hash functions and benchmarks for resource constrained passive devices: A preliminary study, In 2019 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) (IEEE), pp. 1020–1025
Behera TM, Samal UC, Mohapatra SK (2018) Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Syst 8(5):223
Behera AP, Singh A, Verma S, Kumar M (2020) Manifold learning with localized procrustes analysis based WSN localization. IEEE Sensors Lett 4(10):1
Mohar SS, Goyal S, Kaur R (2022) Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics, J Supercomput, pp 1–49
Yousefpoor E, Barati H, Barati A (2021) A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks, Peer-to-Peer Networking and Applications 14(4):1917
Cheng Q, Hsu C, Harn L (2020) Lightweight noninteractive membership authentication and group key establishment for WSNs, Mathematical Problems in Engineering
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shivhare, A., Maurya, M.K., Sarif, J. et al. A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT. J Supercomput 78, 17132–17149 (2022). https://doi.org/10.1007/s11227-022-04533-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04533-0