Skip to main content
Log in

Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) are foundation of Internet of things (IoT). Sensors are mainly deployed for collecting data which will be transmitted to IoT servers. In trying to prevent unauthorized users from stealing, faking even destroying data, it is critical to design a secure data transmission scheme for WSNs in the IoT. In recent years, a great many data transmission schemes have been put forward successively, however, most of these schemes required the sender and the receiver to be in the same network domain, or to share the same system parameters in different environments. Moreover, almost all of data transmission schemes cannot achieve known session-specific temporary information security (KSSTIS). For solving these problems, we proposed a data transmission scheme for WSNs in heterogeneous IoT environment by using heterogeneous ring signcryption. The data transmission scheme allows WSN node under the circumstance of certificateless cryptography (CLC) to transmit the collected data to an IoT server under the public key infrastructure (PKI) environment with different cryptographic system parameters. The proposed scheme which proves to be safe under the Computational Diffie-Hellman (CDH) problem in the random oracle model. Also, the proposed data transmission scheme is practical for wireless sensor networks in heterogeneous IoT environment through the efficiency analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Yaqoob, I., Ahmed, E., Abaker, I., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3), 10–16.

    Article  Google Scholar 

  2. Sethi, P., & Sarangi, S. R. (2017). Internet of things:architectures, protocols, and applications. Journal of Electrical and Computer Engineering. https://doi.org/10.1155/2017/9324035.

    Article  Google Scholar 

  3. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.

    Article  Google Scholar 

  4. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.

    Article  Google Scholar 

  5. Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.

    Article  Google Scholar 

  6. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA. (pp. 649–654). Taiwan, Taipei.

  7. Sharma, G., Bala, S., & Verma, A. K. (2017). PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks. Wireless Personal Communications, 97(1), 1185–1196.

    Article  Google Scholar 

  8. Khan, H. (2018). An identity based routing path verification scheme for wireless sensor networks. International Journal of Sensor Networks, 26(1), 1–15.

    Article  Google Scholar 

  9. Zhu, H. F., Tan, Y. A., Zhu, L. H., et al. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1–15.

    Article  Google Scholar 

  10. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 452–473). Springer Berlin Heidelberg.

  11. Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC’07, (pp. 107–111).

  12. Zhu, L.J., Zhang, F., & Miao, S. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES’10, (pp. 423–427).

  13. Qi, Z. H., Yang, G., & Ren, X. Y. (2011). Provably secure certificateless ring signcryption scheme. China Communications, 8(3), 99–106.

    Google Scholar 

  14. Sharma, G., Bala, S., & Verma, A. K. (2015). Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks. Wireless Personal Communications, 84, 1469–1485.

    Article  Google Scholar 

  15. Shen, H., Chen, J. H., He, D. B., & Shen, J. (2017). Insecurity of a pairing-free certificateless ring signcryption scheme. Wireless Personal Communications, 96, 5635–5641.

    Article  Google Scholar 

  16. Li, F., Zheng, Z., & Jin, C. (2016). Secure and efficient data transmission in the internet of things. Telecommunication Systems, 62(1), 111–122.

    Article  Google Scholar 

  17. Omala, A. A., Mbandu, A. S., Mutiria, K. D., Jin, C., & Li, F. (2018). Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 42(6), 1–14.

    Article  Google Scholar 

  18. Luo, M., Luo, Y., Wan, Y. W., & Wang, Z. (2018). Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks. https://doi.org/10.1155/2018/6140978.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 61662046) and the scientific research project of Jiangxi Province of China (Nos. 20171BCB23014, 20181BCD40005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Luo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Wen, Y. & Hu, X. Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment. Wireless Pers Commun 109, 505–519 (2019). https://doi.org/10.1007/s11277-019-06576-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06576-8

Keywords

Navigation