Securing Topology Control in SDWSNs Using Identity-Based Cryptography

In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of sensors 2023-07, Vol.2023 (1)
Hauptverfasser: Wang, Rui, Liu, Donglan, Liu, Xin, Chen, Jianfei, Ma, Lei, Wang, Yong, Zhang, Hao, Yu, Hao, Su, Bing, Zhang, Fangzhe, Sun, Lili
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title Journal of sensors
container_volume 2023
creator Wang, Rui
Liu, Donglan
Liu, Xin
Chen, Jianfei
Ma, Lei
Wang, Yong
Zhang, Hao
Yu, Hao
Su, Bing
Zhang, Fangzhe
Sun, Lili
description In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.
doi_str_mv 10.1155/2023/6187353
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2843621787</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2843621787</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</originalsourceid><addsrcrecordid>eNp9kL1OwzAYRS0EEiWw8QCRGCE0_rdHCAUqVTC0FWyW6582VYmDnQrl7WnVipHpu8PRvfoOANewvIeQ0iEqER4yKDim-AQMIBO84IiJ079MP8_BRUrrsmSYYzwAo6kz21g3y3wW2rAJyz6vQtPFsMnrJp8-fUzfUj5Pe2BsXdPVXV886uRsXsW-7cIy6nbVX4IzrzfJXR1vBubPo1n1WkzeX8bVw6QwSMKusIJ4q7UWyHPrjEaYcMakh5hLCY2EmkiELKHOCOoNX1DBuJdQaLwgxGKcgZtDbxvD99alTq3DNja7SYUEwQxBvns-A3cHysSQUnRetbH-0rFXsFR7UWovSh1F7fDbA76qG6t_6v_pX4N8ZwA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2843621787</pqid></control><display><type>article</type><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili</creator><contributor>Martinez-Olmos, Antonio ; Antonio Martinez-Olmos</contributor><creatorcontrib>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili ; Martinez-Olmos, Antonio ; Antonio Martinez-Olmos</creatorcontrib><description>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</description><identifier>ISSN: 1687-725X</identifier><identifier>EISSN: 1687-7268</identifier><identifier>DOI: 10.1155/2023/6187353</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algorithms ; Authentication ; Channels ; Communication ; Cryptography ; Data encryption ; Design ; Energy consumption ; Internet of Things ; Messages ; Middle class ; Network security ; Network topologies ; Nodes ; Public Key Infrastructure ; Sensors ; Software ; Software-defined networking ; Wireless sensor networks</subject><ispartof>Journal of sensors, 2023-07, Vol.2023 (1)</ispartof><rights>Copyright © 2023 Rui Wang et al.</rights><rights>Copyright © 2023 Rui Wang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</cites><orcidid>0000-0001-7099-0968 ; 0000-0003-0166-6077</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><contributor>Martinez-Olmos, Antonio</contributor><contributor>Antonio Martinez-Olmos</contributor><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Wang, Yong</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Yu, Hao</creatorcontrib><creatorcontrib>Su, Bing</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><title>Journal of sensors</title><description>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Channels</subject><subject>Communication</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Design</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>Messages</subject><subject>Middle class</subject><subject>Network security</subject><subject>Network topologies</subject><subject>Nodes</subject><subject>Public Key Infrastructure</subject><subject>Sensors</subject><subject>Software</subject><subject>Software-defined networking</subject><subject>Wireless sensor networks</subject><issn>1687-725X</issn><issn>1687-7268</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kL1OwzAYRS0EEiWw8QCRGCE0_rdHCAUqVTC0FWyW6582VYmDnQrl7WnVipHpu8PRvfoOANewvIeQ0iEqER4yKDim-AQMIBO84IiJ079MP8_BRUrrsmSYYzwAo6kz21g3y3wW2rAJyz6vQtPFsMnrJp8-fUzfUj5Pe2BsXdPVXV886uRsXsW-7cIy6nbVX4IzrzfJXR1vBubPo1n1WkzeX8bVw6QwSMKusIJ4q7UWyHPrjEaYcMakh5hLCY2EmkiELKHOCOoNX1DBuJdQaLwgxGKcgZtDbxvD99alTq3DNja7SYUEwQxBvns-A3cHysSQUnRetbH-0rFXsFR7UWovSh1F7fDbA76qG6t_6v_pX4N8ZwA</recordid><startdate>20230719</startdate><enddate>20230719</enddate><creator>Wang, Rui</creator><creator>Liu, Donglan</creator><creator>Liu, Xin</creator><creator>Chen, Jianfei</creator><creator>Ma, Lei</creator><creator>Wang, Yong</creator><creator>Zhang, Hao</creator><creator>Yu, Hao</creator><creator>Su, Bing</creator><creator>Zhang, Fangzhe</creator><creator>Sun, Lili</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SP</scope><scope>7U5</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>D1I</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KB.</scope><scope>L6V</scope><scope>L7M</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-7099-0968</orcidid><orcidid>https://orcid.org/0000-0003-0166-6077</orcidid></search><sort><creationdate>20230719</creationdate><title>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</title><author>Wang, Rui ; Liu, Donglan ; Liu, Xin ; Chen, Jianfei ; Ma, Lei ; Wang, Yong ; Zhang, Hao ; Yu, Hao ; Su, Bing ; Zhang, Fangzhe ; Sun, Lili</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-d84fdaaa82f7deca2347669f137991c91a4922d45ec85fc7b5867f918a3b44d33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Channels</topic><topic>Communication</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Design</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>Messages</topic><topic>Middle class</topic><topic>Network security</topic><topic>Network topologies</topic><topic>Nodes</topic><topic>Public Key Infrastructure</topic><topic>Sensors</topic><topic>Software</topic><topic>Software-defined networking</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Ma, Lei</creatorcontrib><creatorcontrib>Wang, Yong</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Yu, Hao</creatorcontrib><creatorcontrib>Su, Bing</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Materials Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of sensors</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Rui</au><au>Liu, Donglan</au><au>Liu, Xin</au><au>Chen, Jianfei</au><au>Ma, Lei</au><au>Wang, Yong</au><au>Zhang, Hao</au><au>Yu, Hao</au><au>Su, Bing</au><au>Zhang, Fangzhe</au><au>Sun, Lili</au><au>Martinez-Olmos, Antonio</au><au>Antonio Martinez-Olmos</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing Topology Control in SDWSNs Using Identity-Based Cryptography</atitle><jtitle>Journal of sensors</jtitle><date>2023-07-19</date><risdate>2023</risdate><volume>2023</volume><issue>1</issue><issn>1687-725X</issn><eissn>1687-7268</eissn><abstract>In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations. The security of SDWSN topology control has not received enough attention yet. Identity-based cryptography (IBC) may be fitter for SDWSNs due to its capability of generating the public key from the node identity directly, compared with traditional cryptography. In particular, identity-based combined encryption and signature cryptography (IBCES) could encrypt and sign the messages using the same identity. As such, to secure the confidentiality, integrity, and authentication of topology information, we put forward a secure topology control mechanism based on IBCES. First, we use an identity-based encryption authenticated key agreement scheme to implement the authentication of neighbor nodes and hop-to-hop verification via secure neighbor discovery and topology discovery processes. Then through the node admission and key establishment process, the end-to-end secure channels are established between the nodes, sinks, and Controller. Finally, secure topology collection and management processes supporting flat and hierarchical network structures are designed to guarantee the security of topology information. Theoretical analysis shows that our methods could satisfy the security needs of SDWSN topology control and resist several security attacks. The experimental results indicate that our mechanisms are suitable for SDWSNs.</abstract><cop>New York</cop><pub>Hindawi</pub><doi>10.1155/2023/6187353</doi><orcidid>https://orcid.org/0000-0001-7099-0968</orcidid><orcidid>https://orcid.org/0000-0003-0166-6077</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1687-725X
ispartof Journal of sensors, 2023-07, Vol.2023 (1)
issn 1687-725X
1687-7268
language eng
recordid cdi_proquest_journals_2843621787
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Authentication
Channels
Communication
Cryptography
Data encryption
Design
Energy consumption
Internet of Things
Messages
Middle class
Network security
Network topologies
Nodes
Public Key Infrastructure
Sensors
Software
Software-defined networking
Wireless sensor networks
title Securing Topology Control in SDWSNs Using Identity-Based Cryptography
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T23%3A03%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20Topology%20Control%20in%20SDWSNs%20Using%20Identity-Based%20Cryptography&rft.jtitle=Journal%20of%20sensors&rft.au=Wang,%20Rui&rft.date=2023-07-19&rft.volume=2023&rft.issue=1&rft.issn=1687-725X&rft.eissn=1687-7268&rft_id=info:doi/10.1155/2023/6187353&rft_dat=%3Cproquest_cross%3E2843621787%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2843621787&rft_id=info:pmid/&rfr_iscdi=true