0% found this document useful (0 votes)
62 views19 pages

Sensors: A Novel Secure Iot-Based Smart Home Automation System Using A Wireless Sensor Network

Uploaded by

vikasbhowate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views19 pages

Sensors: A Novel Secure Iot-Based Smart Home Automation System Using A Wireless Sensor Network

Uploaded by

vikasbhowate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

sensors

Article
A Novel Secure IoT-Based Smart Home Automation
System Using a Wireless Sensor Network
Sandeep Pirbhulal 1,2,3,† , Heye Zhang 1,2,† , Md Eshrat E Alahi 4,5 , Hemant Ghayvat 4 ,
Subhas Chandra Mukhopadhyay 4,5, *, Yuan-Ting Zhang 6 and Wanqing Wu 1,2, *
1 Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China;
[email protected] (S.P.); [email protected] (H.Z.)
2 Research Center for Biomedical Information Technology, Shenzhen Institutes of Advanced Technology,
1068 Xueyuan Avenue, Shenzhen University Town, Shenzhen 518055, China
3 Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences,
Shenzhen 518055, China
4 School of Engineering and Advanced Technology, Massey University, Palmerston North 4442, New Zealand;
[email protected] (M.E.E.A.); [email protected] (H.G.)
5 Department of Engineering, Macquarie University, Sydney 2109, Australia
6 Joint Research Centre for Biomedical Engineering, Chinese University of Hong Kong, Shatin N.T.,
Hong Kong, China; [email protected]
* Correspondence: [email protected] (S.C.M.); [email protected] (W.W.);
Tel.: +86-755-8639-2262 (W.W.); Fax: +86-755-8639-2066 (W.W.)
† These authors contributed equally to this work.

Academic Editor: Kemal Akkaya


Received: 27 September 2016; Accepted: 27 December 2016; Published: 30 December 2016

Abstract: Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches
for several applications, including smart homes, healthcare, environmental monitoring, and homeland
security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT)
for connecting everyday life objects to the internet. Hence, major challenges of WSNs include:
(i) how to efficiently utilize small size and low-power nodes to implement security during data
transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh
and complex environmental conditions during data transmission over a long coverage range. In this
study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient
data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key
generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi
were included in WSNs with the Internet to develop a novel IoT-based smart home which could
provide secure data transmission among several associated sensor nodes in the network over a long
converge range. The developed IoT based system has outstanding performance by fulfilling all the
necessary security requirements. The experimental results showed that the proposed TBSA algorithm
consumed less energy in comparison with some existing methods.

Keywords: energy-efficient; home automation; internet of things; security; wireless sensor networks

1. Introduction
In 21th century, the Internet of Things (IoT) is one of the most constructive and dominant
wireless communication models. It is the common conception of things that are identifiable, readable,
controllable, addressable, and locatable via the Internet. In the IoT surroundings, all entities of our
everyday life can be associated with the Internet owing to their computing and communication
capabilities. IoT enlarges the perception of the Internet and makes it more suitable for different
applications. Due to this reason, IoT has become more beneficial in numerous domains such as health

Sensors 2017, 17, 69; doi:10.3390/s17010069 www.mdpi.com/journal/sensors


Sensors 2017, 17, 69 2 of 19

monitoring, assisted living monitoring, and smart home automation systems [1]. In these systems,
several kinds of sensors are connected wirelessly to develop distributed networks. The wireless
sensor networks (WSNs) is one of the most essential technologies utilized in IoT-based smart home
automation. These are distributed networks of tiny and light weighted wireless sensor nodes,
which could be extended depending on the requirement of physical parameters such as pressure,
temperature, and relative humidity. Each sensor node in the WSNs includes three subsystems i.e.,
sensor subsystem for environment sensing, processing subsystem for computation of the sensed
information, and a communication subsystem for exchanging the collected data between different
sensors [1–6]. Several studies have integrated WSNs with Internet Protocol (IP) to develop IoT for
offering real-time connectivity of all devices from everyday life at anytime and anywhere [7]. In the
IoT based applications, WSNs are considered as the most significant components which collect the
real-time sensed data from their surrounding environment [8,9]. The traditional WSNs offers a closed
system designed for specific applications, however, IoT-based applications are focused to develop a
large-scale WSNs infrastructure which could support open standard and are independent of specific
applications [10].
In most of the IoT-based home automation systems, the actuators and sensors are positioned
within the home environment to control and supervise its operations. Afterward, these devices are
connected to the local server via a wireless medium for data collection and analysis. One of the
most important issues is how to securely transmit the collected data from the sensor nodes to the
appropriate destination. Therefore, several mechanisms have been proposed to solve this challenging
issue including traditional encryption techniques and security methods developed for WSNs [11–14].
Sensor nodes in these networks have limited resources including restricted power supply, memory,
limited data processing capability, and range of communication [15,16]. Another major issue is how to
efficiently utilize these limited resources for several IoT based applications. Hence, security algorithms
which could consume less energy for data encryption should be utilized in order to make efficient
use of available resources in their networks. Additionally, in IoT based smart home, a large number
of devices are connected to the internet at a long distance. Third most significant issue is how to
increase coverage range to provide a communication framework combining the sensor and backhaul
networks [17]. Hence, highly secured IoT based smart home systems with could provide a balance
between level of security, energy-efficient security algorithm implementation based on efficient key
generation mechanism for data encryption, and capability of network to support communication
among large number of IoT nodes at wide coverage range is much needed.
In this study, a secured IoT based home automation platform was developed. The contribution
of this paper is in threefold; first, the development of novel IoT based hardware platform by using
Intel Galileo Board, TM936 sensor and N-2230 Intel Centrino Wi-Fi module for the collection of
environmental temperature. Second, an energy-efficient security algorithm namely Triangle Based
Security Algorithm (TBSA) on basis of simple and efficient key generation mechanism was proposed
for data encryption. Third, the performance of proposed TBSA is compared with traditional encryption
ciphers and security methods designed for WSNs in terms of energy efficiency.
This research paper is organized as follows: Section 2 comprises of related works. In Section 3,
security requirements in IoT based home automation using WSNs are discussed. Section 4 presents the
methods and implementation while the experimental results and discussion are described in Section 5.
The paper is concluded in Section 6.

2. Related Work
Recently, IoT has been applied in numerous applications including smart home monitoring
systems for assisted living to predict the wellness of residents through the monitoring of several
home appliances [4], building management framework to support energy-saving applications [18],
and human activity patterns monitoring [19,20] among others. As the Internet communications
infrastructure develops to include sensing objects, suitable mechanisms are needed to secure
Sensors 2017, 17, 69 3 of 19

communications with such entities, in the context of IoT applications. In real world IoT applications,
security threats and attacks are becoming a major issue with respect to data transmission. Hence,
it is extremely crucial that the IoT based system should include security mechanism that could
resist possible security threats and attacks in the form of data modification, impersonation,
and eavesdropping, among others. According to [21], IEEE 802.15.4 standard based IPv6 over Low
power Wireless Personal Area Networks (6LoWPAN) in the integration of WSNs with internet is
used for providing secure data transmission in IoT. However, despite of fact that 6LoWPAN-based
IoT systems require less energy for implementing security, it is still not appropriate for smart homes
due to two major issues: (1) An efficient key generation mechanism is not included in IEEE 802.15.4
sandard so how to securely add a new device into the network or to manage the cryptographic
keys is also not explained in that standard [22]. One possible solution for efficient key generation
and management in 6LoWPAN is Lightweight IKEv2, but it requires more resources and energy for
its implementation [23,24]; (2) It is not an appropriate standard for smart homes, since it does not
facilitate communication among a large number of IoT nodes and it also does not have a wide coverage
range [17]. The first issue can be resolved by developing an energy-efficient security algorithm based on
an efficient key generation mechanism for secure data transmission in IoT applications. To resolve the
second problem, recently low-power Wi-Fi systems optimized for sensing applications are available due
to the growing industry requirements for smart objects having IP connectivity [25]. According to [17],
the latest Wi-Fi standard fills this gap by combining the advantages of Wi-Fi and low-power sensor
network communication technologies. The emerging Wi-Fi standard is a promising communication
standard that supports a massive number of heterogeneous devices in the IoT. A comparison between
the latest 802.11 ah and 802.15.4 standards is described in detail in [17]; 802.11 ah performs better
in terms of association time, throughput, delay, and coverage range. Due to all these advantages,
Wi-Fi is the preferred standard over 6LoWPAN for several IoT applications such as smart cities and
smart homes. Therefore, along with the low power Wi-Fi module to support large number of IoT
nodes and to increase coverage range, security algorithm for data encryption based on efficient key
generation mechanism need to be included in WSNs with internet to develop novel secured IoT based
smart home.
Several IoT based systems are developed which includes integration of security mechanisms
within WSNs to provide efficient security for different applications [26–28]. Generally, hash functions,
symmetric and asymmetric encryption algorithms are utilized to offer data security. The asymmetric
algorithms are not suitable for implementing security in sensor networks, due to the limited
computational power of the tiny sensor nodes [6]. Thus, hash functions, symmetric algorithms
including message digest 4 (MD4) [29], message digest 5 (MD5) [30], secure hash algorithm 1
(SHA-1) [31], hash message authentication code (HMAC) [32], Data Encryption Standard (DES) [33],
Advanced Encryption Standard (AES) [34], Rivest Cipher 4 (RC4) [35], blowfish [36], are utilized to
secure the sensor networks. Since, these mentioned techniques are not precisely developed by keeping
in view the specification of WSNs; so these networks require more energy for their implementation.
Therefore, security mechanisms specifically designed for WSNs could be the optimal solution for IoT
applications. Mandal et al. developed a hybrid scheme of both symmetric-key and asymmetric-key
based cryptographic functions for securing WSNs. However, their scheme has not considered all
the major security requirements [16]. Aakash et al. proposed a novel hybrid lightweight security
method namely; PRESENT-GRP for secure data transmission in IoT based applications and it was
implemented on an Intel Galileo Gen 2 board. It follows a complex permutation boxes-based strategy,
which requires more processing time and resources [26]. Wood et al. proposed an alarm-net system to
monitor residential and assisted-living by query protocols. Their system is vulnerable to adversarial
data confidentiality attacks which may reveal the location of the resident, and also it requires several
resources that need more execution time for data encryption [27]. Mian et al. designed a lightweight
payload based mutual authentication method namely; PAWN for cluster based hierarchical WSNs.
Their proposed method is based on two steps: firstly, an election of cluster heads for coordinating the
Sensors 2017, 17, 69 4 of 19

neighboring nodes in the network. Secondly, each cluster head acts as server for valid authentication
of the nodes to initiate data transmission. The major drawback of their approach is that more resources
are required to accomplish the cluster heads election procedure [37].
The challenging problem with all of the aforementioned traditional security mechanisms designed
for WSNs in providing data security methods is that they utilize complex strategies in their respective
system, so more resources are required. Therefore, in this research security algorithm based on the
simple and efficient key generation mechanism is proposed namely; TBSA, it consumes less processing
time and energy for data encryption. The low-power Wi-Fi optimized for sensing applications has
advantages of better association time, throughput, delay, and coverage range; therefore it is preferred in
this research. This study develops a IoT based home automation system by integrating the low power
Wi-Fi and proposed TBSA in WSNs with internet, it increases the coverage range and has the capability
to support a large number of IoT devices. Additionally, the proposed IoT system accomplishes all the
necessary security requirements including confidentiality, privacy, integrity, data freshness, secure
localization, non-repudiation, availability, access control, trustworthiness, and authentication for
protecting the network from critical security attacks and threats.

3. Security Requirements in IoT Based Home Automation Using WSNs


Security is one of the most imperative aspects of any system. People have distinct perceptions
concerning security and therefore it is defined in numerous ways. Generally, security helps protect
the entire system from external as well as internal risks. At present, WSNs are useful platforms in
IoT-based smart home applications, and data transmission in these networks is usually done through
wireless medium. This could cause several severe attacks to the networks as well as pose security
threats to WSNs. This section describes the main requirements for implementing security in IoT based
applications [38–40].

3.1. Authentication
Authentication is one of the requirements in any IoT-based application; it usually deals with the
impersonating threats. In IoT-based automation systems using WSNs, all the sensor nodes transmit
data to the server by the wireless medium. An attacker can effortlessly insert messages into the system,
thus the destination node needs to confirm that the information utilized in any decision making
procedure is initiated from the proper source node. Basically, authentication permits the destination
node to verify if the information was transmitted from the appropriate source node.

3.2. Trustworthiness
It is the ability of a system to authenticate the identity and ascertain trust in a third party.
Third-party trust is a situation in which the source and destination nodes in IoT-based application
can implicitly trust each other although they have not established communication paths for data
transmission beforehand.

3.3. Data Freshness


An attacker can capture the information during its transmission from source to destination and
replay it afterward by utilizing older keys to puzzle the coordinator. Data freshness implies that the
information is fresh and nobody can replay old information.

3.4. Confidentiality and Privacy


In WSNs, it is required to defend the original information from any disclosure. A WSN should
not disclose the original information from source node to the neighboring or even external networks.
In IoT-based smart home applications, the sensor nodes accumulate and forwards specific information
to the server. An attacker can eavesdrop on the data transmission, and can overhear significant
Sensors 2017, 17, 69 5 of 19

data. This eavesdropping phenomenon can lead to severe damage since the adversary can utilize
the captured information for numerous illegal purposes. Therefore, confidentiality ensures that only
verified users can receive the information. Along with that, privacy is also an important concern to
guarantee that all sensor nodes in the system fulfill the privacy policies and help them to manage their
specific data.

3.5. Secure Localization


Most WSN-based applications necessitate an exact assessment of the source location. Lack of
intelligent tracking procedures can permit the attacker to transmit incorrect information about the
source location by stating fake signal strengths. The secured localization is very important for tracking
the actual source node for data transmission.

3.6. Integrity
Beside confidentiality and privacy, integrity is also an important security factor during the
transmission of data in WSNs. An attacker can always change the information by inserting some
fragments of fake information within the transmitted message to alter the originally meaning.
This altered data can be sent to the destination node. Therefore, an integrity mechanism is very
significant to protect the original data from external attacks.

3.7. Non-Repudiation
It is the ability of a system to validate occurrence or non-occurrence of an action from the source
nodes. In IoT-based smart home automation, it is important to ensure that the source nodes should not
deny their authenticity when sending the messages that are originated from them.

3.8. Availability
This property allows reliable access of system resource in timely manner to valid sensor nodes in
the network. In IoT-based applications, it is very essential that network resources should be available
to the appropriate nodes.

3.9. Access Control


To keep out potential attackers, it is needed to recognize each user and each device so as to enforce
security policies. Therefore, noncompliant sensor nodes within the network need to be blocked or
given only limited access. This process is known as network access control (NAC). To develop a
secured IoT-based system, it is extremely crucial that the system should fulfill all the above mentioned
security requirements that could oppose different security attacks like replaying, data modification,
impersonation, and eavesdropping among others.

4. Method and Implementation

4.1. Secured IoT-Based System


This research aimed to develop a secure IoT-based system using WSNs in which collected
data can be securely and efficiently transmitted between source and destination nodes. The specific
information from each sensor is also stored on the server, and the data can be shared with the
proper destination upon validation. Therefore, secure data transmission is necessary for home
automation-based applications. All security constraints (stated in Section 3) are divided into
two categories: network security and data security. Network security requirements include secured
localization, non-repudiation, availability, access control, trustworthiness and authentication while
data security requirements are confidentiality, privacy, integrity, and data freshness. This research
fulfills network security requirements by developing a secured IoT-based platform driven by the
proposed TBSA to accomplish data security constraints.
Sensors 2017, 17, 69 6 of 19

In this study, WSN was developed at School of Engineering and Advanced Technology (SEAT),
Sensors 2017, 17, 69 6 of 19
Sensors 2017, 17, 69 6 of 19
Massey University, Palmerston North, New Zealand. The TMP36 temperature sensors were used for
capturing
capturing environmental
environmental temperature which
temperature which served
served as as the dataset
thethe
dataset in
in the study.
thethe
study. The
The components
components used
capturing environmental temperature which served as dataset in study. The components
to build
used to the sensor
build the nodes
sensor are are
nodes shown
shown in Figure
in Figure 1. 1.The
The temperature
temperature sensor
sensor is presentedininFigure
presented Figure 1a,
used to build the sensor nodes are shown in Figure 1. The temperature sensor is presented in Figure
and Figure
1a,1a,
andand 1b shows
Figure
Figure 1b 1b the
shows Wi-Fi
shows thethemodule
Wi-Fi
Wi-Fi (Intel
module
module Centrino
(Intel
(Intel Wireless
Centrino
Centrino N-2230)
Wireless
Wireless which
N-2230)
N-2230)were
which both
which integrated
werewere bothbothon
an Intel Galileo
integrated
integrated onon anbased
Intel
an microcontroller
Galileo
Intel Galileobased
based board as demonstrated
microcontroller
microcontroller boardboardas as in Figure 1c.inThe
demonstrated
demonstrated Galileo
Figure
in Figure board
1c.1c.
TheThe includes
Galileo
Galileo
aboard
32-bit includes
Intel a 32-bit
Pentium-class Intel Pentium-class
system mounted system
on a chip mounted
that on
contains a
board includes a 32-bit Intel Pentium-class system mounted on a chip that contains an Arduino chip
an that
Arduino contains
Software an Arduino
Development
Software
Environment
Software Development
(IDE), together
Development Environment
with an(IDE),
Environment Intel together
(IDE),processor
together withfor
withan
fastIntel
an processor
processing
Intel processoroffor fastfast
data.
for processing
This board is
processing ofused
of
data.
to data.This
develop board
Thisan board is used
intelligent to develop
is usedwireless
to develop an intelligent
sensor wireless
node. Also,
an intelligent sensor
the Wi-Fi
wireless node.
sensormodule Also,
node. Also, the
wasthe Wi-Fi
mounted module was
on the was
Wi-Fi module board
mounted
alongside
mounted on
theonthe theboard
temperature
boardalongside
sensor to
alongside theproduce
thetemperature
a sensor
temperature sensor
node.
sensor to In
produce
to smart
produce a sensor
home-based
a sensor node. In Insmart
applications,
node. smart it is
home-based
very applications,
important that
home-based it
sensor nodes
applications, is very
it is be important
updated
very that sensor
with information
important nodes
that sensor received be
nodes befromupdated with
the remote
updated information
server located
with information
received
at an
received from
extensive
from the remote
distance
the remoteserver
with goodlocated
server speed
located at
andanreliability.
at anextensive
extensive distance
Therefore,
distance with
Intel
with good speed
Centrino
good and
Wireless
speed reliability.
and N-2230 was
reliability.
Therefore, Intel Centrino
Therefore,
utilized in our Intel
research forWireless
Centrino WirelessN-2230
transmitting the was
N-2230 wasutilized
informationutilized in inourourresearch
over a wide research forfortransmitting
coverage transmitting
range. thethe
This module
information
information over a
over andwide
a widecoverage
coverage range. This module enhances reliability and speeds up to 300
enhances reliability speeds up torange.
300 Mbps Thisformodule enhances reliability and speeds up to 300
data transmission.
Mbps for data transmission.
Mbps for data transmission.

Figure
Figure 1.
Figure1.The
The
1. components
The forfor
components
components thethe
for sensor
the node:
sensor
sensor (a) (a)
node:
node: temperature
(a) Sensor;
temperature
temperature (b)(b)
Wi-Fi
Sensor;
Sensor; (b)Module
Wi-Fi
Wi-Fi (N-2320);
Module
Module (c) (c)
(N-2320);
(N-2320);
Intel Galileo
(c) Intel Board.
IntelGalileo
GalileoBoard.
Board.

The architecture
The of of
architecture WSNs
WSNs including
including three tiers
three for data
tiers transmission between the source and
The architecture of WSNs including three tiers for data
data transmission
transmissionbetween
betweenthe thesource
source and
and
destination nodes
destination nodesis shown
is shownin Figure
in Figure 2. In
2. tier
In 1,
tier the
1, sensor
the nodes
sensor were
nodes weredesigned
designed to collect
to data
collect databyby
destination nodes is shown in Figure 2. In tier 1, the sensor nodes were designed to collect data
using Wi-Fi as a wireless medium, thethe
sensed data is then stored onon
thethe
server in tiertier
2. In this study,
byusing
usingWi-Fi
Wi-Fiasasa wireless medium,
a wireless medium, sensed
the data
sensed is then
data is stored
then stored server
on the in
server2.inIntier
this2.study,
In this
a ThingSpeak
a ThingSpeak server was
server wasused
usedto store
to storethe recorded
the recorded data. Finally
data. in
Finally tier
in 3,
tier the
3, stored
the data
stored was
data was
study, a ThingSpeak server was used to store the recorded data. Finally in tier 3, the stored data was
transmitted to to
transmitted thethe
destination node
destination node after proper
after properauthentication.
authentication.
transmitted to the destination node after proper authentication.

Figure 2. The
Figure hardware implementation of WSNs.
Figure 2.2.The
The hardware
hardware implementation
implementation of
ofWSNs.
WSNs.
Sensors 2017, 17, 69 7 of 19

Sensors 2017, 17, 69 7 of 19


The communication model between the source and destination nodes is shown in Figure 3.
The source Thenode generates information
communication model between which is encrypted
the source by using
and destination nodesanisencryption algorithm.
shown in Figure 3. The It is
very important
source nodetogenerates
convert information
original textwhich
into cipher text, so
is encrypted by it can be
using interpretedalgorithm.
an encryption by proper It destination.
is very
Different encryption
important algorithms
to convert including
original text MD4,
into cipher MD5,
text, so it SHA-1, HMAC, DES,
can be interpreted AES,destination.
by proper RC4, blowfish,
Different
security encryption
algorithms algorithms
for WSNs, and including MD4,TBSA
the proposed MD5,were
SHA-1, HMAC, in
examined DES,
thisAES, RC4,
study. blowfish,
It was observed
security algorithms for WSNs, and the proposed TBSA were examined in this
from the conducted experiments that the compared existing encryption algorithms consumed morestudy. It was observed
energyfrom thethe
than conducted
proposed experiments that the they
TBSA, because compared existing
require moreencryption
overheads algorithms consumed
and complex more to
procedures
energy than the proposed TBSA, because they require more overheads and complex procedures to
encrypt the original information. The TBSA algorithm was specially developed for all applications
encrypt the original information. The TBSA algorithm was specially developed for all applications
which involve the transmission of information among wireless sensor nodes. Since the sensor nodes in
which involve the transmission of information among wireless sensor nodes. Since the sensor nodes
WSNsinhave
WSNs problem of limited
have problem resources
of limited such assuch
resources memory, restricted
as memory, power power
restricted supply,supply,
and data
andprocessing
data
power, the TBSApower,
processing encryption method
the TBSA is used asmethod
encryption a possible solution
is used as ato possible
achieve energy-efficient
solution to achievesecurity
for IoT-based applications.
energy-efficient security for IoT-based applications.

Figure 3. Source-destination data communication model.


Figure 3. Source-destination data communication model.

In our IoT-based system, when a sensor node needs to transmit the periodical information to
In
theour IoT-based
server, then the system,
serverwhen
needsatosensor
verifynode needs tooftransmit
the identity the source thenode.
periodical information
The next step is theto the
server, then the server needs to verify the identity of the source node. The
anonymous confirmation phase where the communication to be initiated from the source node next step is the anonymous
to
confirmation phase where the communication to be initiated from the source node
server is validated. A unique key (KAPI) is assigned to each sensor node for accessing the channel to server is validated.
of
the server
A unique key (Kthrough
API ) is the securedtomedium.
assigned The communication
each sensor node for accessing can be theinitiated
channelonofthethebasis
serverof K
through
API

confirmation
the secured medium. in order
Thetocommunication
develop proper trust
can bebetween the on
initiated source
the and
basisdestination nodes. After this,
of KAPI confirmation in order
the server
to develop produces
proper trust abetween
tracking the
sequence
source(Ts),
andwhich is a sequence
destination nodes.valueAfterofthis,
32-bit.
theThis sequence
server produces
value was arbitrarily generated on the basis of observing the location of the source node. In
a tracking sequence (Ts), which is a sequence value of 32-bit. This sequence value was arbitrarily
particular, for each request of the sensor node, the server produces arbitrary value n and then locates
generated on the basis of observing the location of the source node. In particular, for each request
Ts = n and maintains a record in its database, which can assist the server to observe and record the
of themost
sensor node,
current theeach
Ts for server produces
unique arbitrary
KAPI of every sensorvalue
node inn the
andnetwork.
then locates Ts = n and
This sequence valuemaintains
can be a
record in its database, which can assist the server to observe and record the most
utilized to accelerate the authentication procedure as well as to avoid any replay endeavor from any current Ts for each
unique KAPI ofand
attacker, everyby sensor
lookingnode in the
at the network.
Ts value This sequence
in comparison withvalue can be utilized
the accumulated numberto accelerate
in the the
authentication
database, theprocedure
server ascanwell as toout
figure avoid
the any replay
source endeavor
node. from any
Now, source attacker,
nodes cannot and by looking
deny their at
the Tsauthenticity of the message
value in comparison with thesent from them.number
accumulated Now, during the execution
in the database, of thecan
the server anonymous
figure out the
sourceauthentication
node. Now, phase, sourceifnodes
the Tscannot
provideddenyby their
any sensor node doofnot
authenticity thematch
messagewithsent
the from
accumulated
them. Now,
value in the server then the server instantly ends the connection. In the
during the execution of the anonymous authentication phase, if the Ts provided by any sensor case where the server cannotnode
locate any Ts, the server will need to validate the reserved key (KID) for emergency data
do not match with the accumulated value in the server then the server instantly ends the connection.
transmission, thereafter it attempts to identify the tracking sequence number for emergency data
In the case where the server cannot locate any Ts, the server will need to validate the reserved key (KID )
(Te). If successfully validated, then data transmission between the source node and the server can be
for emergency data transmission, thereafter it attempts to identify the tracking sequence number for
emergency data (Te). If successfully validated, then data transmission between the source node and the
server can be started. Furthermore, the next level of authentication for the network involves service
Sensors 2017, 17, 69 8 of 19

Sensors 2017, 17, 69 8 of 19


set identifier (SSID) and network password validation. Firstly, at this level of authentication the SSID
and network password validation
started. Furthermore, will of
the next level beauthentication
checked. After forproper validation
the network of the
involves SSIDsetand
service password,
identifier
the server
(SSID) then
andchecks
networkthe password
channel and field IDs.
validation. The cipher
Firstly, at thistext generated
level from the source
of authentication node
the SSID andusing
network password
the proposed validation will
TBSA is transmitted tobe checked.
the server After proper
if there validation
is match of theIDs
between SSIDofand
thepassword,
source nodethe and
serverTo
the server. then
keepchecks the channel
out potential and fielditIDs.
attackers, The cipher
is needed text generated
to recognize eachfromuser the
andsource node using
each device in order
the proposed
to enforce securityTBSA is transmitted
policies. to the server
After proper accessifcontrol,
there is match betweenresources
all network IDs of the will
sourcebenode and in
available
the server. To keep out potential attackers, it is needed to recognize each user and each device in
timely manner to the appropriate sensor nodes. This study considered the ThingSpeak server to store
order to enforce security policies. After proper access control, all network resources will be available
the information generated from every sensor node and the collected data are being updated to the
in timely manner to the appropriate sensor nodes. This study considered the ThingSpeak server to
serverstore
afterthe
every 15 s. The HTTP/1.1 protocol of the application layer is used to send the cipher text
information generated from every sensor node and the collected data are being updated to
directly to the server.
the server after every The15request generated
s. The HTTP/1.1 by theofdestination
protocol the applicationnode to acquire
layer is used toinformation will be
send the cipher
fulfilled
textifdirectly
uniquetochannel
the server.ID The
andrequest
field ID matches.byThereafter,
generated the destination
the destination node to acquire node would bewill
information able to
decryptbe the cipher
fulfilled text bychannel
if unique using aIDspecific authentication
and field key.
ID matches. Thereafter, the destination node would be
able to decrypt the cipher text by using a specific authentication key.
4.2. Proposed TBSA Security Method
4.2. Proposed TBSA Security Method
Data security is of the major concerns in a smart home automation infrastructure. It is necessary
Datathe
to ensure that security
server is of the major
receives concerns
actual in a smart
information home
from automation
specific sourceinfrastructure. It is necessary
nodes. Therefore, encryption
to ensure that the server receives actual information from specific
schemes are often utilized to guarantee data security in WSNs. In this study, we proposed the source nodes. Therefore,
encryption schemes are often utilized to guarantee data security in WSNs. In this study, we
TBSA method in order to attain confidentiality, privacy, integrity, and the data freshness with a
proposed the TBSA method in order to attain confidentiality, privacy, integrity, and the data
realistic computational overhead. Our proposed TBSA method is simple because it eradicates the
freshness with a realistic computational overhead. Our proposed TBSA method is simple because it
utilization of complex
eradicates key generation
the utilization of complexprocedures.
key generation TBSA is compatible
procedures. TBSA with prompt with
is compatible and secure
promptdata
transmission, the encryption technique can ensure both the integrity and secrecy
and secure data transmission, the encryption technique can ensure both the integrity and secrecy of of the information
without
theany supplementary
information without cryptographic
any supplementary primitive, like theprimitive,
cryptographic CRC support,
like theMAC,
CRCand hashMAC,
support, functions.
and hash
However, functions.
in WSNs, those However, in WSNs,
techniques, whichthose techniques,
are based which are based
on complicated on complicated
key generation key
mechanisms,
generation
necessitate highmechanisms,
computational necessitate high
cost for thecomputational
management cost
offor theand
keys management of keys and
as well consume a as
lotwell
of time
consume a lot of time and energy during data transmission. This research
and energy during data transmission. This research aims to produce resource efficient security aims to produce resource
efficient security algorithm, which could provide energy-efficient security for home automation
algorithm, which could provide energy-efficient security for home automation based applications.
based applications. The proposed TBSA security algorithm is based on the non-right angle triangle
The proposed TBSA security algorithm is based on the non-right angle triangle key generation
key generation procedure. The block diagram of the efficient key generation mechanism for
procedure. The block diagram of the efficient key generation mechanism for proposed TBSA is
proposed TBSA is shown in Figure 4. The authentication key (K) generated from proposed key
shown in Figure 4. The authentication
generation procedure key (K)
is used to provide generated
unique from proposed
authentication key generation
for data transmission procedure
between the is
used to provide unique authentication
source and destination nodes. for data transmission between the source and destination nodes.

Figure 4. Key generation mechanism for proposed TBSA.


Figure 4. Key generation mechanism for proposed TBSA.
Sensors 2017, 17, 69 9 of 19

Consider a sensor node that transmits the specific data collected form TMP36 at time (t) by using
the proposed TBSA, and sensor’s unique identification (ID) is represented as (u). Furthermore, t and u
are given as input to the square-sum and multiplicative operators. The multiplicative operator simply
multiplies the t and u, and the outcome of this operator is denoted by m as shown in Equation (1).
The square-sum operator initially squares the t and u values independently and then the squared
values are summed to produce the final output (A) as shown in Equation (2):

m = ( u ) ∗ (t) (1)

A = t2 + u2 (2)

The triangular logical function is further used to produce logical parameter, the input to this
function includes three values such as t, u, and α. Consider a STU triangle, which does not include a
right angle. The t and u are acting as two sides of the STU triangle as shown in Figure 5, where addition
of these two values is acting as the corresponding angle (α) for the third side (s) of triangle STU as
shown in Equation (3), and the line UW drawn from the vertex U is perpendicular to ST. Now,
SUW is a right angle triangle, l and d are its two sides, the values of these sides can be calculated
by Equations (4) and (5). Furthermore, l, u and d are used to calculate third side (s) of triangle STU
by applying Pythagoreans theorem as shown in Equation (6). By substituting values of l and d in
Equation (6), we get Equation (7). By expanding the right hand side of Equation (7), we obtained
Equations (8) and (9):
α = (t + u)/2 (3)

sin ∠ α = l/t ⇒ l = t sin ∠ α (4)

cos ∠ α = d/t ⇒ d = t cos ∠ α (5)

By applying Pythagorean Theorem in triangle STU, we have:

s2 = l 2 + (u − d )2 (6)

By substituting for d and l we have:

s2 = (t sin ∠ α)2 + (u − (t cos ∠ α))2 (7)

s2 = t2 sin2 ∠α + u2 − 2ut cos ∠α + t2 cos2 ∠α (8)

s2 = t2 (sin2 ∠α + cos2 ∠α) + u2 − 2tu cos ∠α (9)

As sin2 ∠ α + cos2 ∠ α = 1, by putting this value in Equation (9), we get Equation (10):

s2 = t2 (1) + u2 − 2tu cos ∠α (10)

Triangular cosine function is applied to the angle (α) as demonstrated in Equation (11):

al pha = cos(α) (11)

By inserting the output values from Equations (1), (2) and (11) into Equation (10) to generate
triangular logical parameter (s2 ) as shown in Equation (12):

s2 = A − 2m ∗ (alpha) (12)
Sensors 2017, 17, 69 10 of 19

The squaring operator is applied to the logical triangular parameter, and the output of this
operator is expressed in Equation (13). Equation (14) represents the final key (K) which is utilized for
data authentication between the source and destination nodes, where n is the number of hours per day:

s = sqrt( A − 2m ∗ (alpha)) (13)


n
K= ∑i=1 (si + ti + u)/2 (14)

Suppose M represents the original message from the source node to be encrypted and
authenticated, K is the authentication key, t is the transmission time and u represent the unique sensor
identification. The encryption for the TBSA takes in M, K, t and u, and generates the cipher-text C by
using Equation (15) and it is expanded in Equation (16). At the same time, using M, TBSA generates the
Sensors 2017, 17, 69 10 of 19
cipher-text C and a Tag of length TL . Moreover, this pair (C, TL ) is transmitted to the receiver. The M
can be variable, unlike
Suppose M other traditional
represents symmetric
the original message ciphers
from the where
source the
nodedata
to belength needs
encrypted andto be fixed.
authenticated,
This unique feature makes K is the
ourauthentication
proposed TBSA key, t algorithm
is the transmission time and u represent
more energy-efficient. the unique
Because sometime the
sensor identification. The encryption for the TBSA takes in M, K, t and u, and generates the
source node has less information than their block size of message, fixing this challenge is a mandatory
cipher-text C by using Equation (15) and it is expanded in Equation (16). At the same time, using M,
requirement
TBSA forgenerates
many symmetric algorithms.
the cipher-text C and a Tag Even forTless
of length information, fixed block sizes are sent in the
L. Moreover, this pair (C, TL) is transmitted to

traditionalthe
encryption
receiver. Thealgorithms. Thisunlike
M can be variable, wastes a lot
other of resources
traditional and
symmetric power
ciphers during
where data
the data transmission
length
needs
between the to be fixed.
source This unique feature
and destination nodes.makes our proposed
Therefore, TBSA algorithm
our proposed more energy-efficient.
algorithm takes advantage of the
Because sometime the source node has less information than their block size of message, fixing this
variable block sizes for data encryption in order to provide energy-efficient security:
challenge is a mandatory requirement for many symmetric algorithms. Even for less information,
fixed block sizes are sent in the traditional encryption algorithms. This wastes a lot of resources and
power during data transmission between C =the ⊕ t) ∗and
(usource M/ (K )
destination nodes. Therefore, our proposed (15)
algorithm takes advantage of the variable block sizes for data encryption in order to provide
n
energy-efficient security: C = ( M ∗ (u ⊕ t ))/ ( ∑ t =1
(s + t + u)/2) (16)
C  (u  t ) * M / ( K ) (15)
The receiver performs decryption on C to obtain M by using Equation (17) and it is expanded
in Equation (18). Subsequently, the C receiver t )) / (tn1(s that
(M *(u guarantees t  u)the
/ 2) received Tag is anticipated.
(16) If the
destination node calculates dissimilar Tag then the cipher message will be unacceptable. In this case,
The receiver performs decryption on C to obtain M by using Equation (17) and it is expanded in
if the M involves n blocks of data, then TBSA requires only n + 1 encryption to sustain both the
Equation (18). Subsequently, the receiver guarantees that the received Tag is anticipated. If the
confidentiality and integrity:
destination node calculates dissimilar Tag then the cipher message will be unacceptable. In this case,
= C ∗requires
M TBSA
if the M involves n blocks of data, then K/(u ⊕ t) n + 1 encryption to sustain both the
only (17)
confidentiality and integrity:
n
M = C ∗ (∑t=1 (s + t + u)/2)/(u ⊕ t) (18)
M  C*K/ (u t) (17)
The proposed TBSA, apart from data confidentiality, privacy, and integrity, also guarantees the
M  C *(tn1(s  t  u) / 2) / (u t) (18)
data freshness by utilizing the incremental operator (Io) with limit up to N. The Io constantly gives
an updated additional
The proposedvalue
TBSA, similar to adata
apart from counter, which privacy,
confidentiality, is obtained from an
and integrity, incrementing
also guarantees the operation.
data freshness
Consequently, by utilizing
it is very the incremental
much essential thatoperator
both the (Io)source
with limit up to
and N. The Io constantly
destination nodesgives an a distinct
utilize
updated additional value similar to a counter, which is obtained from an incrementing operation.
fresh nonce N for every transmission. Now, the proposed IoT-based home automation system includes
Consequently, it is very much essential that both the source and destination nodes utilize a distinct
the TBSA fresh
mechanism
nonce N using
for everythetransmission.
unique authentication
Now, the proposed key KIoT-based
and fresh nonce
home N for data
automation systemencryption.
Furthermore, the the
includes server
TBSAobtains
mechanism the periodic updates
using the unique from the source
authentication node
key K and to nonce
fresh checkNthefor confidentiality,
data
encryption.
privacy, integrity, Furthermore,
and freshnesstheofserver obtains theinformation.
the collected periodic updates from the source node to check the
confidentiality, privacy, integrity, and freshness of the collected information.

Figure
Figure5. TriangleSTU.
5. Triangle STU.

4.3. Security Analysis


This section demonstrates that the proposed IoT-based platform fulfills all the necessary
security characteristics and requirements to oppose severe threats and attacks.
Sensors 2017, 17, 69 11 of 19

4.3. Security Analysis


This section demonstrates that the proposed IoT-based platform fulfills all the necessary security
Sensors 2017, 17, 69 11 of 19
characteristics and requirements to oppose severe threats and attacks.
4.3.1.
4.3.1. Network
Network Security
Security Requirements
Requirements Accomplishment
Accomplishment
The
The IoT-based platform was
IoT-based platform was implemented
implemented on on the basis of
the basis of the
the proposed
proposed security
security algorithm
algorithm that
that
provides network authentication at three different levels as shown in Figure 6. Authentication
provides network authentication at three different levels as shown in Figure 6. Authentication level 1 level
1includes
includessecurity
securityofofdata
datatransmitted
transmittedfromfromthethesource
sourcetotothe
theserver,
server,and
andififKKAPI does
does not
not match
match at
at the
the
API
source node, communication will not be initiated. In our proposed system, the server
source node, communication will not be initiated. In our proposed system, the server validates the validates the
source nodeby
source node byverifying
verifyingthetheonetime
onetime alias
alias identity
identity KAPI
KAPI andandthethe track
track sequence
sequence number
number Ts, where
Ts, where only
only a valid sensor node can start communication with the server
a valid sensor node can start communication with the server (authentication). (authentication).

Three-levels of network security for IoT-based systems.


Figure 6. Three-levels

In smart home
In smart home automation
automation applications,
applications, the the assessment
assessment of of the
the source
source nodenode location
location is is very
very
significant. In real-time applications, if there is no smart tracking method
significant. In real-time applications, if there is no smart tracking method available, this can permit available, this can permit
the
the hacker
hacker to transmit
to transmit erroneous
erroneous location location
by theby the initiating
initiating false signals.
false signals. Our proposed
Our proposed IoT-based IoT-based
system
system
can easily cansolve
easilythis
solve this problem.
problem. When the When the desires
server server desires to recognize
to recognize the sourcethe source node location,
node location, then it
then it will exercise the tracking sequence number Ts identity
will exercise the tracking sequence number Ts identity which is the physical association betweenwhich is the physical association
the
between
sensor node the and
sensor
the node
serverand the server
(secured (securedConsequently,
localization). localization). the Consequently,
server will also the inquire
server will also
the node
inquire
to present theitsnode to present
identity. its identity.
After that, the server After that, the server
substantiates substantiates
the Ts provided by the the Ts provided
node by the
by contrasting it
node by contrasting it with the accumulated value of its record, and
with the accumulated value of its record, and subsequently figures out the source node. Now, if the subsequently figures out the
source node.isNow,
verification if the verification
successful, then the server is successful,
can trust then
on the theauthenticity
server can trustof the onnode
the authenticity of the
(trustworthiness).
node (trustworthiness). Once the source entity identity is recognized, the
Once the source entity identity is recognized, the source node cannot deny its authenticity for sending source node cannot deny
its authenticity for sending the originated messages thus fulfilling one
the originated messages thus fulfilling one of the major non-repudiation security requirements of IoT.of the major non-repudiation
security requirements
At level of IoT. of channel ID and field ID are used to decide either to send data from
2, the verification
the server to destination or not.ofFirstly,
At level 2, the verification channelatID and
this field
level ofID are used to decide
authentication, securityeither to send
service setdata from
identifier
the server
(SSID) andtonetwork
destination or not.validation
password Firstly, at will
this be
level of authentication,
checked. After proper security service
validation set SSID
of the identifier
and
(SSID) and network password validation will be checked. After proper
password, the server will check the channel and field IDs. The cipher text generated from source node validation of the SSID and
password, the server will check the channel and field IDs. The cipher
using the proposed TBSA is transmitted to the server if there is a match in IDs. In cases where there is text generated from source
node usingthe
no match, thereceiving
proposednode(s)
TBSA is transmitted
will not be given to the server
access if there
to the is a match
network (accessincontrol).
IDs. In cases
To keepwhere
out
there is no match, the receiving node(s) will not be given access to the
potential attackers, it is needed to recognize each user and each device on the network so as to enforcenetwork (access control). To
keep out potential attackers, it is needed to recognize each user and each
security policies. After proper access control, all the network resources will be available in timely device on the network so as
to enforce
manner tosecurity
the validpolicies. After proper access
nodes (availability). Finally,control, all the network
at the receiver end, by resources
using the will be availablekey,
authentication in
timely manner to the valid nodes (availability). Finally, at
the original medical information can be recovered. Hence, WSN implemented based on the proposed the receiver end, by using the
authentication
TBSA provideskey, the original
a secured, medical information
less computationally can beand
complex, recovered. Hence, WSN
energy-efficient implemented
data encryption to
based on the proposed TBSA provides a secured,
monitor data remotely from between the source and destination nodes. less computationally complex, and energy-efficient
data encryption to monitor data remotely from between the source and destination nodes.

4.3.2. Data Security Requirements Accomplishment


The data security comprised of confidentiality, privacy, integrity, and data freshness. Since
WSNs have a broadcast nature, so information could easily be changed and replayed by the
attackers. Therefore, the proposed TBSA is used for data encryption; it assures all the requirements
Sensors 2017, 17, 69 12 of 19

4.3.2. Data Security Requirements Accomplishment


The data security comprised of confidentiality, privacy, integrity, and data freshness. Since WSNs
Sensors 2017, 17, 69 12 of 19
have a broadcast nature, so information could easily be changed and replayed by the attackers.
Therefore, the proposed
of data security, where anyTBSA is used
change in for
datadata encryption;
or any it assuresby
replay endeavor allattacker
the requirements of data
can be accurately
security, where any change
detected by means of a tag. in data or any replay endeavor by attacker can be accurately detected by
means of a tag.
4.4. Energy Consumption Calculation
4.4. Energy Consumption Calculation
This study utilizes a circuit across the sensor node as shown in Figure 7, in order to evaluate the
power Thisutilization
study utilizes a circuit
of the across the
proposed TBSA sensor
in node as shown
encrypting theinoriginal
Figure 7,information.
in order to evaluate the
A digital
power utilization of the proposed TBSA in encrypting the original information.
oscilloscope (TDS 2024B, Tektronix, Beaverton, OR, USA) is utilized to compute the voltage (Vs) A digital oscilloscope
(TDS
across2024B, Tektronix,
the resistor (0.6Beaverton, OR, USA) isOhm’s
ohms). Furthermore, utilizedlawto compute
can be usedthe voltage
to determine (Vs ) across the resistor
the current (Is)
(0.6 ohms). Furthermore, Ohm’s law can be used to determine
across the given resistor (R). In a series circuit, the current remains the same,the current (I s ) across
so this current resistor
the given will be
(R).
sameInacross
a series
thecircuit,
resistorthe current
and sensorremains
node. The thepower
same,(P sos)this current
utilized willnode
by the be same across theby
is determined resistor
using
and
Equation (18). Finally, the energy consumption (Es) of the sensor node will be computed byFinally,
sensor node. The power (Ps ) utilized by the node is determined by using Equation (18). using
the energy(19).
Equation consumption (Es ) ofby
The time taken thethe
sensor node TBSA
proposed will betocomputed
encrypt the by original
using Equation (19). The time
text is represented by
taken
(Ts): by the proposed TBSA to encrypt the original text is represented by (T s ):

Pss =
P  VVss ∗
* IIss (19)
(19)

EEss= PPss ∗* T
Ts
s
(20)
(20)

Figure
Figure 7.
7. Experimental
Experimental setup
setup for
for investigating
investigating the energy consumption.
the energy consumption.

5. Experiment
5. Experiment Results
Results and
and Discussion
Discussion
This section
This sectionmainly includes
mainly the temperature
includes measurement
the temperature using a using
measurement TMP36a sensor
TMP36(Sparkfun
sensor
Electronics, Niwot, CO, USA), proposed TBSA-based data encryption to provide secure
(Sparkfun Electronics, Niwot, CO, USA), proposed TBSA-based data encryption to provide secure data
transmission, and performance comparisons of proposed TBSA with traditional symmetric
data transmission, and performance comparisons of proposed TBSA with traditional symmetric and and hash
ciphers,
hash and security
ciphers, mechanisms
and security developed
mechanisms for WSNs
developed including
for WSNs Alarm-Net,
including PRESENT-GRP
Alarm-Net, PRESENT-GRPand
PAWN
and PAWNin terms of energy-efficiency.
in terms of energy-efficiency.

5.1. Temperature
5.1. Measurement
Temperature Measurement
In this
In this study,
study, low low voltage
voltage temperature
temperature (TMP36)(TMP36) sensors
sensors were
were used
used toto sense
sense the
the environment
environment
temperature. The TMP36 utilizes a solid-state method to measure the temperature
temperature. The TMP36 utilizes a solid-state method to measure the temperature in C, and in °C,
◦ and it
it does
does
not require
not requireany anyexternal
external calibration
calibration to deliver
to deliver characteristic
characteristic accuracies
accuracies for different
for different temperature
temperature levels.
levels. This sensor is operated by a single power supply having
This sensor is operated by a single power supply having a range of 2.7 to 5.5 V. a range of 2.7 to 5.5 V.
The actual
The actual output
output fromfrom TMP36
TMP36 is is in
in ADC;
ADC; the the ADC
ADC value
value should
should bebe converted
converted intointo the
the correct
correct
voltage (V
voltage (VTMP
TMP).).The
TheADC ADCvalue
value (ADC
(ADCoutput ) is initially compared with the reference voltage of 5 V as
output ) is initially compared with the reference voltage of 5 V as
shown in Equation (20) and then the characteristics
shown in Equation (20) and then the characteristics of of the
the TMP36
TMP36 are used to
are used to obtain
obtain the
the temperature
temperature
(T) as
(T) as represented
represented by by the
the Equation
Equation (21).
(21). The
The linear
linear relationship
relationship between
between voltage
voltage andand temperature
temperature isis
shown in Figure
shown in Figure 8: 8:

VTMP ADCoutput ∗*5V


VTMP =( (ADC )/1024 (21)
output 5V ) / 1024 (21)
T = (VTMP − 0.5V )/10 (22)
T  (VTMP  0.5V ) / 10 (22)
Sensors 2017, 17, 69 13 of 19
Sensors 2017, 17, 69 13 of 19

Sensors 2017, 17, 69 13 of 19

Figure 8. Temperature
Figure 8. Temperaturevalues
values against corresponding
against corresponding voltage
voltage values.
values.

5.2. TBSA EncryptionFigure 8. Temperature values against corresponding voltage values.


5.2. TBSA Encryption
The Intel Galileo-based source node collects the temperature values, further collected data is
5.2. TBSA
The Intel Encryption
Galileo-based source node collects the temperature values, further collected data is
transmitted to the server by using Wi-Fi as a medium. Moreover, the original collected data is
transmitted ThetoIntel
encrypted the server
to cipher by by
Galileo-based
text using Wi-Fi
source
using as
thenode a medium.
collects
proposed TBSA Moreover,
the to itsthe
temperature
prior originalfurther
values,
transmission collected datain
to thecollected
server isdata
encrypted
order is
to cipher text
transmitted by to using
the the
server proposed
by using TBSA
Wi-Fi prior
as a to its
medium. transmission
Moreover,
to offer privacy and security to the original sensed information during transmission. theto the
originalserver in
collectedorderdata to
is offer
encrypted
privacy and to
security
Consider cipher text by
to thenode
a sensor using
original
havingthe proposed
sensed
unique TBSA
information prior
ID (u) of 28,during to its transmission
transmission.
transmission to the server in
(t) of 16 h, and α value of 44. order
to offer
The u, sprivacy
Consider and a sensorand security
t representnode to thesides
thehaving
three original
unique sensed
of the (u)information
IDtriangle
of 28, during
transmission
as shown transmission.
in Figure (t)5.of 16value
The h, and of α
the value
thirdof 44.
The u,side Consider
(s) tisrepresent
s and a sensor
calculatedthe node
to three having
be 12.03 unique
byofusing
sides ID (u) of
Equationas(13).
the triangle 28, transmission
shown in Figure(t)
By inserting 5.ofThe
the 16 value
valuesh, and
of u,α svalue
of and
the tofinto
third 44.
side (s)
The u,
Equation s and
(14),t represent
a unique the
key three
with asides
value of the
of triangle
28.01 is as shown
generated. Byin Figure
inserting 5.
theThe value
unique of
key the
and third
the
is calculated to be 12.03 by using Equation (13). By inserting the values of u, s and t into Equation (14),
side (s) is
original calculated to be 12.03 byisusing Equation (13).(15),
By inserting the values ofvalue
u, s and t into
a unique keymessage
with a value M (whose value
of 28.01 21) into
is generated. Equation
By inserting thea cipher
uniquetext keywithandathe of 8.99
original is
message
Equation (14), a unique key with a value of 28.01 is generated. By inserting
obtained.In this study, two sensors nodes were used for performing the experiment. The unique IDs the unique key and the
M (whose
originalvalue
messageis 21) into Equation (15), ainto
cipher text with aavalue oftext
8.99withis obtained.In thisisstudy,
for sensor node 1 M and(whose
2 are 26 value
and is28,21) Equation
respectively. The (15),
experiment cipherwas performed a value
betweenof 8.9913:30
two sensors
obtained.Innodes were used for performing the used
experiment. The unique IDs for sensor nodesIDs 1 and 2
and 15:30 onthis study,
24 May twoThe
2016. sensors nodes
original were
message for performing
obtained from both sensorthe experiment. The unique
nodes is shown in Figure
are 269.
for sensor node 1 and 2 are 26 and 28, respectively. The experiment was performed between 13:30 2016.
and 28, respectively. The experiment was performed between 13:30 and 15:30 on 24 May
The original
and 15:30message
on 24 May obtained
2016. The from bothmessage
original sensor nodes
obtained is from
shown bothinsensor
Figurenodes9. is shown in Figure
9.

Figure 9. Original message from sensor node 1 and sensor node 2.

Figure
Figure
Further, the proposed 9. Original
9. Original
TBSA message
message
is applied from
tofrom sensor node
sensor
the original node 1 1and
messages and sensor node
sensor
from 2.
node
both 2. nodes in order
sensor
to obtain the cipher messages as shown in Figure 10, which were later uploaded to the server. The
Further,
received data the proposed
at the server TBSAa is
from appliednode
different to thecan
original messages
be stored from both
in different sensor
in thenodes in order
Further,
to obtain
the proposed
thefields
TBSA
cipherinmessages
is applied toFigure
the original messages from fields
both sensor same
nodes channel
inThe
order to
or different differentaschannels.
shown inThe 10, which
different fieldswere later uploaded
separate to the server.
the information from each
obtain the cipher
received datamessages
at the as shown in Figurenode
10, which were
storedlater uploaded to the server. The received
subject, through thisserver fromfrom
way; data a different
each node can can
bebeunderstood in different
easily. Infields in the
this research,same channel
channel ID
data at the
or 110980server
different from a different node can be stored in different fields in the same channel or different
is forfields in different
both sensor nodes.channels. The
The single different
channel canfields
have separate
maximumthe information
support up to 8from each
different
fieldssubject,
in different
through channels.
this way;Thedatadifferent
from eachfields
node canseparate the information
be understood from
easily. In this each subject,
research, channelthrough
ID
is 110980
this way; data for
fromboth
eachsensor
nodenodes.
can beThe single channel
understood canInhave
easily. this maximum support ID
research, channel up is
to 110980
8 different
for both
sensor nodes. The single channel can have maximum support up to 8 different fields by using the
ThingSpeak server. The field ID assigned for sensor node 1 is “1” and for a sensor node 2 is “5”.
Sensors 2017, 17, 69 14 of 19

Sensors 2017, 17, 69 14 of 19


fields by using the ThingSpeak server. The field ID assigned for sensor node 1 is “1” and for a sensor
node 2 is “5”.

Figure 10. Cipher


Figure message
10. Cipher from
message sensor
from sensornode
node 11 and sensornode
and sensor node2 2byby using
using proposed
proposed TBSA.
TBSA.

5.3. Energy Consumption Comparison


5.3. Energy Consumption Comparison
The proposed security algorithm is based on a simple and efficient key generation procedure.
The proposed security algorithm is based on a simple and efficient key generation procedure.
Hence, it reduces the time requirement for key generation and encryption. As sensor nodes in WSNs
Hence, areit very
reducestiny theandtime
haverequirement
limited power, fortherefore,
key generation
it is very and encryption.
significant to use Asless
sensor nodes in WSNs
time-consuming
are very tinymechanism
security and have for limited
WSNs. power, therefore,
The energy it is very
consumption significant
is linearly to use less
proportional time-consuming
to the processing
security
time.mechanism for WSNs.
That is, the higher taken The energy
to encrypt consumption
a message, the more is linearly
the energy proportional
required. to the processing
time. ThatThe is, the
TBSA higher takenvery
consumes to encrypt
less time a message, the more the (7
for its implementation energy required.key generation
µm). Complex
mechanisms are not used in this algorithm, that’s why
The TBSA consumes very less time for its implementation (7 µm). Complex TBSA consumes fewer resourceskey for its data
generation
encryption. The power consumption by a sensor node during
mechanisms are not used in this algorithm, that’s why TBSA consumes fewer resources for its data the implementation of TBSA
algorithm
encryption. Theispowercalculated by using the
consumption by circuit
a sensor as node
explained
during in Figure 7. The voltage of
the implementation (Vs) across
TBSA the
algorithm
sensor nodes was 47 mA, which was calculated by using an oscilloscope. The resistance (R) of the
is calculated by using the circuit as explained in Figure 7. The voltage (Vs) across the sensor nodes was
resistor as determined by Ohm’s law is 0.6 Ω, the current (Is) was computed as 78.33 mA by
47 mA, which was calculated by using an oscilloscope. The resistance (R) of the resistor as determined
substituting the values of Vs and R into Ohms law (V = IR), and the calculated power was calculated
by Ohm’s
as 3.6lawmW. 0.6 Ω,
is The the current
power consumed (Is)bywas
thecomputed
sensor nodes as 78.33
and the mA by substituting
processing time forthedatavalues of Vs and
encryption
R intousing
Ohms law (V = IR), and the calculated power was calculated as
the proposed TBSA were used to calculate the energy consumption across the nodes. After 3.6 mW. The power consumed
by theinserting
sensor nodes3.6 mW and
andthe processing
7-µm time
values into for data(19),
Equation encryption using the proposed
energy consumption TBSAofwere
per bit value 0.025used
to calculate the energy
Micro Joule consumption
was obtained. Since one across
byte hasthe eight
nodes. After
bits, inserting
therefore 3.6 mW
(8 × 0.025 = 0.2and
Micro7-µm values into
Joule/Byte)
0.2 Micro
Equation Joule/Byte
(19), energy will be required
consumption by the
per bit valueproposed
of 0.025 TBSA
Micro algorithm
Joule was to encrypt a byte
obtained. of data.
Since one byte has
eight bits,Intherefore
this research, the energy
(8 × 0.025 = 0.2consumption
Micro Joule/Byte) by the TBSA algorithm
0.2 Micro is compared
Joule/Byte will be with the hash
required by the
function and symmetric ciphers.
proposed TBSA algorithm to encrypt a byte of data. The hash functions take a message of random size and produces an
output of fixed-size value. A small change in the original text can affect the computation of a
In this research, the energy consumption by the TBSA algorithm is compared with the hash
dissimilar hash value. They are mostly utilized for validating the reliability of data transmission
function and symmetric ciphers. The hash functions take a message of random size and produces
between nodes. In this study, proposed TBSA is compared with the hash functions such as MD4,
an output
MD5 and of fixed-size
SHA-1 in value.
terms ofAenergy-efficiency.
small change inThe theSHA1original
is a text
new can
hashaffect the computation
algorithm and has more of a
dissimilar
steps for computation than MD4 and MD5. SHA1 is also considered to have better transmission
hash value. They are mostly utilized for validating the reliability of data collision
between nodes.than
resistance In this
MD4 study,
and MD5.proposed TBSAof
This benefit is SHA-1
compared withmore
requires the energy
hash functions
than MD4such and as
MD5.MD4,TheMD5
and SHA-1
HMACin terms ofmore
consumes energy-efficiency.
energy than MD4, The MD5 SHA1andisSHA-1.
a newThe hash algorithm
HMAC andhash,
is a keyed has more
and assteps
the for
bit-length of the key is raised from 0 to 128 bits, the energy consumption
computation than MD4 and MD5. SHA1 is also considered to have better collision resistance than MD4 fluctuates by a very minute
amount.
and MD5. This Figure
benefit11a ofrepresents the energy
SHA-1 requires moreconsumption
energy than comparison
MD4 and of MD5.
proposedTheTBSAHMAC algorithm
consumes
more energy than MD4, MD5 and SHA-1. The HMAC is a keyed hash, and as the bit-length ofand
with MD4, MD5, SHA-1 and HMAC. The energy consumed by TBSA, MD4, MD5, SHA-1 the key
HMAC is 0.20, 0.52, 0.59, 0.76 and 1.16 Micro Joule/Byte respectively, as shown in Table 1.
is raised from 0 to 128 bits, the energy consumption fluctuates by a very minute amount. Figure 11a
represents the energy consumption comparison of proposed TBSA algorithm with MD4, MD5, SHA-1
and HMAC. The energy consumed by TBSA, MD4, MD5, SHA-1 and HMAC is 0.20, 0.52, 0.59, 0.76
and 1.16 Micro Joule/Byte respectively, as shown in Table 1.
Sensors 2017, 17, 69 15 of 19

Table 1. Energy Consumption Comparison with Hash Functions.

S. NO Technique/Method Energy Consumption (Micro Joule/Byte)


1 Proposed TBSA 0.20
2 MD4 0.52
Sensors 2017, 17, 69 15 of 19
3 MD5 0.59
4 SHA-1 0.76
Table 1. Energy Consumption Comparison with Hash Functions.
5 HMAC 1.16
S. NO Technique/Method Energy Consumption (Micro Joule/Byte)
TBSA: Triangle Based Security Algorithm, MD4: Message Digest 4, MD5: Message Digest 5, SHA-1: Secure Hash
1 Proposed TBSA 0.20
Algorithm 1, HMAC: Hash Message Authentication Code.
2 MD4 0.52
3 MD5 0.59
4 SHA-1 0.76
Furthermore, this research includes the energy consumption comparisons of the proposed TBSA
5 HMAC 1.16
algorithm with symmetric ciphers. There are two major types of symmetric ciphers block ciphers
TBSA: Triangle Based Security Algorithm, MD4: Message Digest 4, MD5: Message Digest 5, SHA-1: Secure Hash
and stream cipher to1,implement
Algorithm security.
HMAC: Hash Message BlockCode.
Authentication ciphers work on identical-length blocks of original
text and cipherFurthermore,
text. Examples of block ciphers comprise
this research includes the energy consumptionData Encryption
comparisons Standard (DES), Advanced
of the proposed
EncryptionTBSA
Standard
algorithm(AES),
with etc. The stream
symmetric ciphers.ciphers such
There are two as Rivest
major Cipher
types 4 (RC4)
of symmetric convert
ciphers blockan original
ciphers
text to cipher textandonestream
bit cipher to implement
(or byte) at a time.security.
RC4Block ciphers workasonfast
is considered identical-length
and efficient blocks of
stream cipher,
original text and cipher text. Examples of block ciphers comprise Data Encryption Standard (DES),
which is appropriate for encrypting information with more speed. However, it requires noteworthy
Advanced Encryption Standard (AES), etc. The stream ciphers such as Rivest Cipher 4 (RC4) convert
encryptionancost in comparison
original with
text to cipher text oneother
bit (orsymmetric ciphers.
byte) at a time. Blowfishasdisplays
RC4 is considered the largest
fast and efficient streamdifference
between the energy
cipher, which consumption
is appropriate of forkey setup and
encrypting encryption
information or decryption.
with more speed. However, The itenergy
requirescost of key
noteworthy
setup is the so high than encryption cost in comparison
encryption and decryptionwith other
cost.symmetric
It 64-bitciphers.
cipherBlowfish displays the
which executes encryption
largest difference between the energy consumption of key setup and encryption or decryption. The
using straightforward processes and is intended to be efficient on 32-bit processors. This method
energy cost of key setup is the so high than encryption and decryption cost. It 64-bit cipher which
is appropriate for encryption
executes applications usingwhere the secretprocesses
straightforward key is notand changing
is intendedregularly (thereby
to be efficient allowing the
on 32-bit
significantprocessors.
overhead This of key setupis toappropriate
method be amortized by the lowwhere
for applications encryption
the secretcost).
key The
is notdesign principle for
changing
regularly
AES algorithm (thereby
is based onallowing the significant
a combination of both overhead of key and
substitution setuppermutation
to be amortized by the low
method. It is a variant
encryption cost). The design principle for AES algorithm is based on a combination of both
of Rijndaelsubstitution
which hasand a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. The DES is a
permutation method. It is a variant of Rijndael which has a fixed block size of 128
symmetricbits,
cipher
and aofkeythesize
64-bit block
of 128, 192, as it utilizes
or 256 bits. Thethe
DESidentical key for
is a symmetric both
cipher of encryption
the 64-bit blockand decryption.
as it
The key size for each
utilizes roundkey
the identical is 56
forbits. Conversely,
both encryption andadecryption.
64-bit input The is
keyused foreach
size for dissimilar
round is keys
56 bits.generation.
Figure 11bConversely,
symbolizes a 64-bit
the input
energy is used for dissimilarcomparison
consumption keys generation.of Figure
TBSA11b symbolizeswith
algorithm the energy
RC4, Blowfish,
consumption comparison of TBSA algorithm with RC4, Blowfish, AES, and DES. The energy
AES, and DES. The energy consumed by TBSA, RC4, Blowfish, AES and DES
consumed by TBSA, RC4, Blowfish, AES and DES is 0.20, 0.49, 0.81, 1.2 and 2.08 Micro Joule/Byte,
is 0.20, 0.49, 0.81, 1.2
and 2.08 Micro Joule/Byte, respectively,
respectively, as expressed in Table 2. as expressed in Table 2.

Figure 11.Figure
Energy11. Energy consumption comparison of proposed TBSA (a) with Hash Functions; (b) with
consumption comparison of proposed TBSA (a) with Hash Functions; (b) with
Symmetric Cipher.
Symmetric Cipher.
Sensors
Sensors 2017,
2017, 17,
17, 69
69 16
16 of
of 19
19

Table 2. Energy consumption comparison with symmetric cipher.


Table 2. Energy consumption comparison with symmetric cipher.
S. NO Technique/Method Energy Consumption (Micro Joule/Byte)
S. NO1 Proposed TBSA
Technique/Method 0.20 (Micro Joule/Byte)
Energy Consumption
2 RC4 0.49
1 Proposed TBSA 0.20
3 Blowfish 0.81
2 RC4 0.49
34 AES
Blowfish 1.20
0.81
45 DES
AES 2.80
1.20
TBSA: Triangle5Based Security Algorithm,
DES 2.80
RC4: Rivest Cipher 4, AES: Encryption Standard, DES: Advanced
Encryption Standard
TBSA: Triangle Based Security Algorithm, RC4: Rivest Cipher 4, AES: Encryption Standard, DES: Advanced
Encryption Standard
Finally, security methods for WSN-based applications are compared with the proposed
algorithm.
Finally,The average
security data for
methods encryption
WSN-based times for the Alarm-Net
applications are compared [27], PRESENT-GRP
with [26], and
the proposed algorithm.
PAWN [37] are 0.0123, 0.0156 and 0.01785 ms, respectively. Alarm-Net
The average data encryption times for the Alarm-Net [27], PRESENT-GRP [26], and PAWN [37] are requires more processing
cycles
0.0123,to0.0156
generate
andunique
0.01785keys, due to whichAlarm-Net
ms, respectively. more timerequires
is consumed
more for the encryption
processing cycles toof generate
original
information
unique keys,than due to allwhich
comparedmore methods. PAWN for
time is consumed utilizes a simple procedure
the encryption for cluster head
of original information than
assortment, so it needs a small processing time for data encryption
all compared methods. PAWN utilizes a simple procedure for cluster head assortment, so it needs than PRESENT-GRP anda
alarm-net. PRESENT-GRP
small processing time for datausesencryption
a lightweightthanalgorithm
PRESENT-GRP for implementing
and alarm-net.security, so it requires
PRESENT-GRP lessa
uses
processing
lightweighttime than Alarm-Net,
algorithm but because
for implementing of permutation
security, so it requires boxes selection procedure
less processing time thanaAlarm-Net,
little more
time is required
but because for encryption
of permutation boxesthan PAWN.
selection The simple
procedure andmore
a little efficient
timekey generation
is required mechanismthan
for encryption are
utilized
PAWN. The in proposed
simple and TBSA (0.007
efficient keyms), thereforemechanism
generation it demands areless encryption
utilized time than
in proposed TBSAAlarm-Net,
(0.007 ms),
PRESENT-GRP
therefore it demands, and less
PAWN. The power
encryption time consumption
than Alarm-Net, by sensor nodes for, different
PRESENT-GRP and PAWN. approaches
The power is
3.60, 3.66, 3.71by
consumption and 3.74 nodes
sensor mW for forPAWN,
different PRESENT-GRP,
approaches is 3.60, and Alarm-Net,
3.66, 3.71 and respectively,
3.74 mW for as PAWN,
can be
calculated
PRESENT-GRP, by using
and the circuit shown
Alarm-Net, in Figure
respectively, 7. The
as can energy consumption
be calculated by using the is the product
circuit shown inofFigure
power7.
and encryption time as shown in Equation (19) after inserting 3.6 mW
The energy consumption is the product of power and encryption time as shown in Equation (19) afterand 0.007 ms value for the
proposed
inserting 3.6TBSA
mWinand Equation
0.007 ms (19), thefor
value energy consumption
the proposed TBSAper bit is calculated
in Equation (19), theas 0.025 consumption
energy Micro Joule.
As
perone byte
bit is has eight
calculated as bits,
0.025soMicro
8 × 0.025 = 0.2
Joule. As Micro
one byteJoule/Byte
has eightwill
bits,besorequired
8 × 0.025by the Micro
= 0.2 TBSA Joule/Byte
algorithm
to
willencrypt one by
be required byte
the of
TBSA data. Hence, tofor
algorithm PAWN,
encrypt one PRESENT-GRP,
byte of data. Hence, andforAlarm-Net, the energy
PAWN, PRESENT-GRP,
consumption
and Alarm-Net, canthebeenergy
calculated as 8 × 0.0123
consumption can be× calculated
3.66 = 0.36asMicro Joule/Byte,
8 × 0.0123 × 3.66 8= 0.36
× 0.0156
Micro × Joule/Byte,
3.71 = 0.47
Micro Joule/Byte, and 8 × 0.01785 × 3.74 = 0.53 Micro Joule/Byte, respectively
8 × 0.0156 × 3.71 = 0.47 Micro Joule/Byte, and 8 × 0.01785 × 3.74 = 0.53 Micro Joule/Byte, respectively as shown in Table 3.
The comparisons
as shown in Tableof 3.proposed TBSA with
The comparisons PAWN, PRESENT-GRP,
of proposed TBSA with PAWN, andPRESENT-GRP,
Alarm-Net in terms of energy
and Alarm-Net
consumption are demonstrated
in terms of energy consumptionin areFigure 12.
demonstrated in Figure 12.

Figure 12.
Figure Energy consumption
12. Energy consumption comparison
comparison of
of proposed
proposed TBSA
TBSA with
with security
security mechanisms
mechanisms developed
developed
for WSNs.
for WSNs.

It
It has
has been
been observed
observed from
from Figures
Figures 11
11 and
and 12
12 that
that the
the proposed
proposed TBSA
TBSA algorithm
algorithm requires
requires less
less
energy
energy for its implementation in comparison with traditional security methods. As a simple
for its implementation in comparison with traditional security methods. As a simple and
and
efficient
efficient key
key generation
generation mechanism
mechanism is is used
used in
in TBSA,
TBSA, therefore
therefore less
less energy
energy is
is consumed.
consumed. Therefore,
Therefore,
the
the proposed secure IoT-based home automation incorporates the proposed TBSA and
proposed secure IoT-based home automation incorporates the proposed TBSA and low
low power
power
Wi-Fi in WSNs with internet for providing efficient and secure data transmission among several
nodes at wide coverage range.
Sensors 2017, 17, 69 17 of 19

Wi-Fi in WSNs with internet for providing efficient and secure data transmission among several nodes
at wide coverage range.

Table 3. Energy consumption comparison with security methods designed for WSNs.

S. NO Technique/Method Energy Consumption (Micro Joule/Byte)


1 Proposed TBSA 0.20
2 PAWN 0.36
3 PRESENT-GRP 0.47
4 Alarm-Net 0.53

6. Conclusions
This paper proposed secured IoT-based home automation applications using WSNs. In WSNs,
because of the limited computational power of sensor nodes, an efficient security mechanism based
on effective key generation mechanism which could accomplish all major data security requirements
and consumes less processing time for data encryption is well needed. In this study a security
algorithm, namely TBSA, based on a simple and efficient key generation procedure is developed.
The proposed IoT integrates low power Wi-Fi and the proposed TBSA in WSNs with internet to
provide additional benefits of increased coverage range and capability of supporting large number
of sensor nodes due to usage of low power Wi-Fi module; it also consumes less processing time for
data encryption because of the utilization of the proposed TBSA algorithm. The experimental results
obtained from the hardware implementation have elaborated that the proposed algorithm TBSA is
more energy-efficient for data encryption than all compared approaches. Furthermore, it has been
verified in this study that developed IoT platform fulfills all major security requirements including
network security (secure localization, non-repudiation, availability, access control, trustworthiness and
authentication) and data security (confidentiality, privacy, integrity, and data freshness).
In near future, proposed IoT platform will be implemented for different applications such
as medical monitoring and emergency response, agriculture, healthcare, energy management,
and industrial automation. Additionally, we will develop an efficient biometric-based security
algorithm based on Heart Rate Variability (HRV) to secure modern healthcare system using
Wireless Body Sensor Networks (WBSNs). The time-domain parameters of HRV such as Standard
Deviation of NN interval (SDNN) and Root-Mean Squared of the Successive Differences (RMSSD)
along with TBSA will be used for key generation or entity identifications in WBSNs.

Acknowledgments: This work was supported in part by the Science Technology and Innovation Committee of
Shenzhen for research projects (Grant CXZZ20140909004122087, JYJC20130327093948937, JCYJ20140416141331483,
JCYJ20150529164154046 and JCYJ20130401164750005), Guangdong Image-guided Therapy Innovation Team
(2011S013), the Guangzhou Science and Technology Planning Project (No. 2014J4100153 & No. 2016A030310129).
Author Contributions: Pirbhulal, S., Zhang, H. and Alahi, M.E. illustrated the research theme and fulfilled the
literature study; Pirbhulal, S., Ghayvat, H. and Wu, W. scrutinized the data, developed Methods and Experiments;
Pirbhulal, S., Zhang, H. and and Wu, W. interpreted the results and wrote the paper; Pirbhulal, S. and Zhang, H.
and carried out the whole experiments; and Mukhopadhyay, S.C. and Zhang, Y.T. assisted to supervise the field
activities and formulated the study’s systematic strategy.
Conflicts of Interest: The authors declare no conflict of interest.

References
1. Ghayvat, H.; Mukhopadhyay, S.; Liu, J.; Babu, A.; Alahi, M.E.E.; Gui, X. Internet of things for smart homes
and buildings. Aust. J. Telecommun. Digit. Econ. 2015, 3, 33–47. [CrossRef]
2. He, D.; Chan, S.; Guizani, M.; Yang, H.; Zhou, B. Secure and distributed data discovery and dissemination in
wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1129–1139. [CrossRef]
Sensors 2017, 17, 69 18 of 19

3. Ghormare, S.; Sahare, V. Implementation of data confidentiality for providing high security in wireless sensor
network. In Proceedings of the 2015 International Conference on Innovations in Information, Embedded
and Communication Systems (ICIIECS), Coimbatore, India, 19–20 March 2015.
4. Ghayvat, H.; Liu, J.; Mukhopadhyay, S.C.; Gui, X. Wellness sensor networks: A proposal and implementation
for smart home for assisted living. IEEE Sens. J. 2015, 15, 7341–7348. [CrossRef]
5. Venkatasubramanian, K.K.; Banerjee, A.; Gupta, S.K.S. Pska: Usable and secure key agreement scheme for
body area networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 60–68. [CrossRef] [PubMed]
6. Poon, C.C.Y.; Zhang, Y.T.; Bao, S.D. A novel biometrics method to secure wireless body area sensor networks
for telemedicine and m-health. IEEE Commun. Mag. 2006, 44, 73–81. [CrossRef]
7. Zinonos, Z.; Vassiliou, V. Inter-Mobility support in controlled 6LoWPAN networks. In Proceedings of the
2010 IEEE Globecom Workshops, Miami, FL, USA, 5–10 December 2010.
8. Jiang, Y.; Zhang, L.; Wang, L. Wireless sensor networks and the internet of things. Int. J. Distrib. Sens. Netw.
2013, 2013, 1578–1584. [CrossRef]
9. Ghaleb, S.M.; Subramaniam, S.; Zukarnain, Z.A.; Muhammed, A. Mobility management for IoT: A survey.
EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1–25. [CrossRef]
10. Li, J.; Zhang, Y.; Chen, Y.-F.; Nagaraja, K.; Li, S.; Raychaudhuri, D. A mobile phone based WSN infrastructure
for IoT over future internet architecture. In Proceedings of the IEEE International Conference on and IEEE
Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013.
11. Sana, J.H.; Imran, J.A.; Andew, K.H. Light-weight framework for security-sensitive wireless sensor networks
applications. IET Wirel. Sens. Syst. 2013, 3, 298–306.
12. Mondal, B.; Priyadarshi, A.; Hariharan, D. An improved cryptography scheme for secure image
communication. Int. J. Comput. Appl. 2013, 67, 23–27. [CrossRef]
13. Roman, R.; Alcaraz, C.; Lopez, J.; Sklavos, N. Key management systems for sensor networks in the context of
the internet of things. Comput. Electr. Eng. 2011, 37, 147–159. [CrossRef]
14. Mandal, S.; Chaki, R. A secure encryption logic for communication in wireless sensor networks. Int. J.
Cryptogr. Inf. Secur. 2012, 2, 78–82. [CrossRef]
15. Dargie, W. Dynamic power management in wireless sensor networks: State-of-the-art. IEEE Sens. J. 2012, 12,
1518–1528. [CrossRef]
16. Castagnetti, A.; Pegatoquet, A.; Le, T.N.; Auguin, M. A joint duty-cycle and transmission power management
for energy harvesting WSN. IEEE Trans. Ind. Inform. 2014, 10, 928–936. [CrossRef]
17. Ahmed, N.; Rahman, H.; Hussain, M.I. A comparison of 802.11 AH and 802.15. 4 for IoT. ICT Express 2016, 2,
100–102. [CrossRef]
18. Antonio, G.; Ruzzelli, A.; Giancarlo, F.; Antonio, G.R.; Gregory, O.H. A WSN-based building management
framework to support energy-saving applications in buildings. Adv. Distrib. Comput. Internet Technol.
Trends Issues 2011, 1, 161–174.
19. Rashidi, P.; Cook, D.J. Com: A method for mining and monitoring human activity patterns in home-based
health monitoring systems. ACM Trans. Intell. Syst. Technol. 2013, 4, 64. [CrossRef]
20. Cicirelli, F.; Fortino, G.; Giordano, A.; Guerrieri, A.; Spezzano, G.; Vinci, A. On the design of smart homes:
A framework for activity recognition in home environment. J. Med. Syst. 2016, 40, 1–17. [CrossRef] [PubMed]
21. Granjal, J.; Edmundo, M.; Jorge, S.S. Security for the internet of things: A survey of existing protocols and
open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [CrossRef]
22. Hennebert, C.; Dos Santos, J. Security protocols and privacy issues into 6LoWPAN stack: A synthesis.
IEEE Inter. Things J. 2014, 1, 384–398. [CrossRef]
23. Raza, S.; Voigt, T.; Jutvik, V. Lightweight IKEv2: A key management solution for both the compressed ipsec
and the IEEE 802.15. 4 security. In Proceedings of the IETF Workshop on Smart Object Security, Paris, France,
23 March 2012.
24. Kasraoui, M.; Cabani, A.; Chafouk, H. Ikev2 authentication exchange model in ns-2. In Proceedings
of the 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, Taiwan,
10–12 June 2014.
25. Rghioui, A.; Bouhorma, M.; Benslimane, A. Analytical study of security aspects in 6lowpan networks.
In Proceedings of the 5th International Conference Information and Communication Technology for the
Muslim World (ICT4M), Rabat, Morocco, 26–27 March 2013.
Sensors 2017, 17, 69 19 of 19

26. Aakash, D.; Shanthi, P. Lightweight security algorithm for wireless node connected with IoT. Indian J.
Sci. Technol. 2016, 9, 1–8. [CrossRef]
27. Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.; Fang, L.; He, Z.; Lin, S.; Stankovic, J.
Alarm-net: Wireless sensor networks for assisted-living and residential monitoring. Univ. Va. Comput.
Sci. Dep. Tech. Rep. 2006, 2, 1–14.
28. Gope, P.; Hwang, T. Bsn-care: A secure IoT-based modern healthcare system using body sensor network.
IEEE Sens. J. 2016, 16, 1368–1376. [CrossRef]
29. Dobbertin, H. Cryptanalysis of MD4. In Proceedings of the International Workshop on Fast Software
Encryption, Cambridge, UK, 21–23 February 1996.
30. Deepakumara, J.; Heys, H.M.; Venkatesan, R. Fpga implementation of MD5 hash algorithm. In Proceedings
of the Canadian Conference on Electrical and Computer Engineering, Toronto, ON, Canada, 13–16 May 2001.
31. Zibin, D.; Ning, Z. Fpga implementation of SHA-1 algorithm. In Proceedings of the 5th IEEE International
conference on ASIC, Beijing, China, 21–24 October 2003.
32. Bellare, M.; Canetti, R.; Krawczyk, H. Message authentication using hash functions: The hmac construction.
RSA Lab. CryptoBytes 1996, 2, 12–15.
33. Horta, E.L.; Lockwood, J.W.; Taylor, D.E.; Parlour, D. Dynamic hardware plugins in an fpga with partial
run-time reconfiguration. In Proceedings of the 39th annual Design Automation Conference, New Orleans,
LA, USA, 10–14 June 2002.
34. Mandal, A.K.; Parakash, C.; Tiwari, A. Performance evaluation of cryptographic algorithms: Des and aes,
Electrical. In Proceedings of the 2012 IEEE Students’ Conference on Electronics and Computer Science
(SCEECS), Bhopal, India, 1–2 March 2012.
35. Chang, D.; Gupta, K.C.; Nandi, M. Rc4-hash: A new hash function based on RC4. In Proceedings of the
International Conference on Cryptology, Kolkata, India, 11–13 December 2006.
36. Schneier, B. Description of a new variable-length key, 64-bit block cipher (blowfish). In Proceedings of the
International Workshop on Fast Software Encryption, Cambridge, UK, 9–11 December 1993.
37. Mian, J.; Priyadarsi, N.; Muhammad, U.; Xiangjian, H. PAWN: A payload-based mutual authentication
scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 2016, 1, 1–10.
38. Nia, A.M.; Jha, N.K. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput.
2016, 1, 1–21.
39. Sicari, S.; Alessandra, R.; Luigi, A.G.; Alberto, C.P. Security, privacy and trust in Internet of Things: The road
ahead. Comput. Netw. 2015, 76, 146–164. [CrossRef]
40. Jing, Q.; Athanasios, V.V.; Wan, J.; Lu, J.; Qiu, D. Security of the internet of things: Perspectives and challenges.
Wirel. Netw. 2014, 8, 2481–2501. [CrossRef]

© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC-BY) license (http://creativecommons.org/licenses/by/4.0/).

You might also like