TY - GEN
T1 - Efficient End-To-End Security Scheme for Privacy-Preserving in IoT
AU - Harbi, Yasmine
AU - Aliouat, Zibouda
AU - Refoufi, Allaoua
AU - Harous, Saad
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - Internet of Things (IoT) is an emerging technology that enables the interconnection between everyday objects to provide a smart environment. In near future, billions of devices equipped with sensors and actuators are expected to be connected to the Internet. Data aggregation is a practical solution to reduce the massive amount of data moving within the Internet. Moreover, the data collected by sensors can be deeply sensitive. Hence, ensuring the privacy of sensed data is highly required. However, the limited resources of sensors make the design of secure IoT mechanisms a hard and complex task. In this paper, we propose an efficient cryptographic scheme to secure aggregation and transmission of sensed data in Wireless Sensor Networks (WSNs). The proposed scheme is based on Elliptic Curve Cryptography (ECC) and Message Authentication Code (MAC) in order to provide end-To-end security. Security properties are evaluated through formal and informal analysis. The proposed scheme achieves better performance compared to a recent related work.
AB - Internet of Things (IoT) is an emerging technology that enables the interconnection between everyday objects to provide a smart environment. In near future, billions of devices equipped with sensors and actuators are expected to be connected to the Internet. Data aggregation is a practical solution to reduce the massive amount of data moving within the Internet. Moreover, the data collected by sensors can be deeply sensitive. Hence, ensuring the privacy of sensed data is highly required. However, the limited resources of sensors make the design of secure IoT mechanisms a hard and complex task. In this paper, we propose an efficient cryptographic scheme to secure aggregation and transmission of sensed data in Wireless Sensor Networks (WSNs). The proposed scheme is based on Elliptic Curve Cryptography (ECC) and Message Authentication Code (MAC) in order to provide end-To-end security. Security properties are evaluated through formal and informal analysis. The proposed scheme achieves better performance compared to a recent related work.
KW - Data aggregation
KW - Elliptic Curve Cryptography
KW - Message Authentication Code
KW - Wireless Sensor Networks
KW - homomorphic encryption
UR - http://www.scopus.com/inward/record.url?scp=85071944315&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85071944315&partnerID=8YFLogxK
U2 - 10.1109/ICNAS.2019.8807811
DO - 10.1109/ICNAS.2019.8807811
M3 - Conference contribution
AN - SCOPUS:85071944315
T3 - Proceedings - ICNAS 2019: 4th International Conference on Networking and Advanced Systems
BT - Proceedings - ICNAS 2019
A2 - Derdour, Makhlouf
A2 - Ahmim, Marwa
A2 - Bendjedou, Amira
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Networking and Advanced Systems, ICNAS 2019
Y2 - 26 June 2019 through 27 June 2019
ER -