Efficient End-To-End Security Scheme for Privacy-Preserving in IoT

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Internet of Things (IoT) is an emerging technology that enables the interconnection between everyday objects to provide a smart environment. In near future, billions of devices equipped with sensors and actuators are expected to be connected to the Internet. Data aggregation is a practical solution to reduce the massive amount of data moving within the Internet. Moreover, the data collected by sensors can be deeply sensitive. Hence, ensuring the privacy of sensed data is highly required. However, the limited resources of sensors make the design of secure IoT mechanisms a hard and complex task. In this paper, we propose an efficient cryptographic scheme to secure aggregation and transmission of sensed data in Wireless Sensor Networks (WSNs). The proposed scheme is based on Elliptic Curve Cryptography (ECC) and Message Authentication Code (MAC) in order to provide end-To-end security. Security properties are evaluated through formal and informal analysis. The proposed scheme achieves better performance compared to a recent related work.

Original languageEnglish
Title of host publicationProceedings - ICNAS 2019
Subtitle of host publication4th International Conference on Networking and Advanced Systems
EditorsMakhlouf Derdour, Marwa Ahmim, Amira Bendjedou
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728126425
DOIs
Publication statusPublished - Jun 2019
Event4th International Conference on Networking and Advanced Systems, ICNAS 2019 - Annaba, Algeria
Duration: Jun 26 2019Jun 27 2019

Publication series

NameProceedings - ICNAS 2019: 4th International Conference on Networking and Advanced Systems

Conference

Conference4th International Conference on Networking and Advanced Systems, ICNAS 2019
Country/TerritoryAlgeria
CityAnnaba
Period6/26/196/27/19

Keywords

  • Data aggregation
  • Elliptic Curve Cryptography
  • Message Authentication Code
  • Wireless Sensor Networks
  • homomorphic encryption

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Efficient End-To-End Security Scheme for Privacy-Preserving in IoT'. Together they form a unique fingerprint.

Cite this