Securing Topology Control in SDWSNs Using Identity-Based Cryptography
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat...
Gespeichert in:
Veröffentlicht in: | Journal of sensors 2023-07, Vol.2023 (1) |
---|---|
Hauptverfasser: | , , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | Journal of sensors |
container_volume | 2023 |
creator | Wang, Rui Liu, Donglan Liu, Xin Chen, Jianfei Ma, Lei Wang, Yong Zhang, Hao Yu, Hao Su, Bing Zhang, Fangzhe Sun, Lili |
description | In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs. |
doi_str_mv | 10.1155/2023/6187353 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2843621787</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2843621787</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</originalsourceid><addsrcrecordid>eNp9kL1OwzAYRS0EEiWw8QCRGCE0_rdHCAUqVTC0FWyW6582VYmDnQrl7WnVipHpu8PRvfoOANewvIeQ0iEqER4yKDim-AQMIBO84IiJ079MP8_BRUrrsmSYYzwAo6kz21g3y3wW2rAJyz6vQtPFsMnrJp8-fUzfUj5Pe2BsXdPVXV886uRsXsW-7cIy6nbVX4IzrzfJXR1vBubPo1n1WkzeX8bVw6QwSMKusIJ4q7UWyHPrjEaYcMakh5hLCY2EmkiELKHOCOoNX1DBuJdQaLwgxGKcgZtDbxvD99alTq3DNja7SYUEwQxBvns-A3cHysSQUnRetbH-0rFXsFR7UWovSh1F7fDbA76qG6t_6v_pX4N8ZwA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2843621787</pqid></control><display><type>article</type><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili</creator><contributor>Martinez-Olmos, Antonio ; Antonio Martinez-Olmos</contributor><creatorcontrib>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili ; Martinez-Olmos, Antonio ; Antonio Martinez-Olmos</creatorcontrib><description>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</description><identifier>ISSN: 1687-725X</identifier><identifier>EISSN: 1687-7268</identifier><identifier>DOI: 10.1155/2023/6187353</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algorithms ; Authentication ; Channels ; Communication ; Cryptography ; Data encryption ; Design ; Energy consumption ; Internet of Things ; Messages ; Middle class ; Network security ; Network topologies ; Nodes ; Public Key Infrastructure ; Sensors ; Software ; Software-defined networking ; Wireless sensor networks</subject><ispartof>Journal of sensors, 2023-07, Vol.2023 (1)</ispartof><rights>Copyright © 2023 Rui Wang et al.</rights><rights>Copyright © 2023 Rui Wang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</cites><orcidid>0000-0001-7099-0968 ; 0000-0003-0166-6077</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><contributor>Martinez-Olmos, Antonio</contributor><contributor>Antonio Martinez-Olmos</contributor><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Wang, Yong</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Yu, Hao</creatorcontrib><creatorcontrib>Su, Bing</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><title>Journal of sensors</title><description>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Channels</subject><subject>Communication</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Design</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>Messages</subject><subject>Middle class</subject><subject>Network security</subject><subject>Network topologies</subject><subject>Nodes</subject><subject>Public Key Infrastructure</subject><subject>Sensors</subject><subject>Software</subject><subject>Software-defined networking</subject><subject>Wireless sensor networks</subject><issn>1687-725X</issn><issn>1687-7268</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kL1OwzAYRS0EEiWw8QCRGCE0_rdHCAUqVTC0FWyW6582VYmDnQrl7WnVipHpu8PRvfoOANewvIeQ0iEqER4yKDim-AQMIBO84IiJ079MP8_BRUrrsmSYYzwAo6kz21g3y3wW2rAJyz6vQtPFsMnrJp8-fUzfUj5Pe2BsXdPVXV886uRsXsW-7cIy6nbVX4IzrzfJXR1vBubPo1n1WkzeX8bVw6QwSMKusIJ4q7UWyHPrjEaYcMakh5hLCY2EmkiELKHOCOoNX1DBuJdQaLwgxGKcgZtDbxvD99alTq3DNja7SYUEwQxBvns-A3cHysSQUnRetbH-0rFXsFR7UWovSh1F7fDbA76qG6t_6v_pX4N8ZwA</recordid><startdate>20230719</startdate><enddate>20230719</enddate><creator>Wang, Rui</creator><creator>Liu, Donglan</creator><creator>Liu, Xin</creator><creator>Chen, Jianfei</creator><creator>Ma, Lei</creator><creator>Wang, Yong</creator><creator>Zhang, Hao</creator><creator>Yu, Hao</creator><creator>Su, Bing</creator><creator>Zhang, Fangzhe</creator><creator>Sun, Lili</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SP</scope><scope>7U5</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>D1I</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KB.</scope><scope>L6V</scope><scope>L7M</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-7099-0968</orcidid><orcidid>https://orcid.org/0000-0003-0166-6077</orcidid></search><sort><creationdate>20230719</creationdate><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><author>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Channels</topic><topic>Communication</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Design</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>Messages</topic><topic>Middle class</topic><topic>Network security</topic><topic>Network topologies</topic><topic>Nodes</topic><topic>Public Key Infrastructure</topic><topic>Sensors</topic><topic>Software</topic><topic>Software-defined networking</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Wang, Yong</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Yu, Hao</creatorcontrib><creatorcontrib>Su, Bing</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Materials Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of sensors</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Rui</au><au>Liu, Donglan</au><au>Liu, Xin</au><au>Chen, Jianfei</au><au>Ma, Lei</au><au>Wang, Yong</au><au>Zhang, Hao</au><au>Yu, Hao</au><au>Su, Bing</au><au>Zhang, Fangzhe</au><au>Sun, Lili</au><au>Martinez-Olmos, Antonio</au><au>Antonio Martinez-Olmos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</atitle><jtitle>Journal of sensors</jtitle><date>2023-07-19</date><risdate>2023</risdate><volume>2023</volume><issue>1</issue><issn>1687-725X</issn><eissn>1687-7268</eissn><abstract>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2023/6187353</doi><orcidid>https://orcid.org/0000-0001-7099-0968</orcidid><orcidid>https://orcid.org/0000-0003-0166-6077</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1687-725X |
ispartof | Journal of sensors, 2023-07, Vol.2023 (1) |
issn | 1687-725X 1687-7268 |
language | eng |
recordid | cdi_proquest_journals_2843621787 |
source | Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Authentication Channels Communication Cryptography Data encryption Design Energy consumption Internet of Things Messages Middle class Network security Network topologies Nodes Public Key Infrastructure Sensors Software Software-defined networking Wireless sensor networks |
title | Securing Topology Control in SDWSNs Using Identity-Based Cryptography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A03%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20Topology%20Control%20in%20SDWSNs%20Using%20Identity-Based%20Cryptography&rft.jtitle=Journal%20of%20sensors&rft.au=Wang,%20Rui&rft.date=2023-07-19&rft.volume=2023&rft.issue=1&rft.issn=1687-725X&rft.eissn=1687-7268&rft_id=info:doi/10.1155/2023/6187353&rft_dat=%3Cproquest_cross%3E2843621787%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2843621787&rft_id=info:pmid/&rfr_iscdi=true |