Hybrid Key Generation for Securing the Sensor Cloud

Authors

  • Binu Ruby Sunny  PG Scholar, Akshaya College of Engineering and Technology
  • P. Parthasarathi  Assistant Professor, Department of CSE, Akshaya College of Engineering and Technology, Tamil Nadu, India
  • Prof. S. Shankar  Professor and Head, CSE Department, Hindustan College of Engineering and Technology, Tamil Nadu, India
  • Dr. N. Suguna  Professor, Akshaya College of Engineering and Technology, Tamil Nadu, India

Keywords:

Sensors, Communication, Security, Wireless Network, PKG, SGCUE

Abstract

Sensor devices are susceptible to a variety of attacks including the black hole, wormhole and denial of service attacks. These kinds of attacks extract the most confidential information which is exchanged between the devices. First, to make sensor networks economically viable, sensor devices are limited in their energy, computation, and communication capabilities. Second, unlike traditional networks, sensor nodes are often deployed in accessible areas, presenting the added risk of physical attack. And third, sensor networks interact closely with their physical environments and with people, posing new security problems. When setting up a sensor network, one of the first requirements is to establish cryptographic keys for later use. Cryptography entails a performance cost for extra computation that often increases packet size. Cryptographic hardware support increases efficiency but also increases the financial cost of implementing a network. Many types of attack are executed by taking the node identity as input parameter. By taking the advantage of hiding the identity information from the packet is lead to protect and prevent the malicious attacks during communication. Identity-based encryption is a public-key encryption in which the public-key of a user can be set as an identity-string of the user. There is a private key generator (PKG) in IBE which holds a master-secret key, and issues a secret key to each user with respect to the user identity. During data access, for both uploading and downloading process shared key is used to protect the data. The performance evaluation shows that the proposed Hybrid Key Generation System (HKGS) for securing the WSN achieves the best performance compare to the existing Secured Group Communication Using ECC (SGCUE) in terms of the packet delivery ratio, Transmission Delay, Throughput, Control Overhead, Normalized Overhead, Goodput and Jitter.

References

  1. J. Byun, and S. Park, "Development of a self-adapting intelligent system for building energy saving and context-aware smart services," IEEE Trans. Consumer Electron., vol. 57, no. 1, pp. 90-98, Feb. 2011.
  2. W. Noh, and T. Kim, "Flexible communication-bus architecture for distributed multimedia service in cloud computing platform," IEEE Trans. Consumer Electron., vol. 59, no. 3, pp. 530-537, Aug. 2013.
  3. Z. Fu, J. Shu, X. Sun, and N. Linge, "Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data," IEEE Trans. Consumer Electron., vol. 60, no. 4, pp. 762-770, Nov. 2014.
  4. P. A. Cabarcos, F. A. Mendoza, R. S. Guerrero, A. M. Lopez, and D. Diaz-Sanchez, "SuSSo: Seamless and ubiquitous single sign-on for cloud service continuity across devices," IEEE Trans. Consumer Electron., vol. 58, no. 4, pp. 1425-1433, Nov. 2012.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Binu Ruby Sunny, P. Parthasarathi, Prof. S. Shankar, Dr. N. Suguna, " Hybrid Key Generation for Securing the Sensor Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 3, pp.89-92, May-June-2019.