Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure

Author(s):  
Aishwariya Chakraborty ◽  
Ayan Mondal ◽  
Arijit Roy ◽  
Sudip Misra
Author(s):  
Bhavana Butani ◽  
Piyush Kumar Shukla ◽  
Sanjay Silakari

Wireless sensor networks are utilized in vital situations like military and commercial applications, traffic surveillance, habitat monitoring, and many other applications. WSNs have to face various issues and challenges in terms of memory, communication, energy, computation, and storage, which require efficient management of huge amount of sensor data. Therefore, storage is an important issue in the WSN. Emergence of Sensor-Cloud infrastructure overcomes several shortcomings of WSN such as storage capacity and offers high processing capabilities for huge sensor data. Security is also the major challenge that is faced by the sensor network. This chapter includes a brief overview of the importance of cloud computing in sensor networks and the goal of DDoS and Node Capture Attack in WSN. This chapter includes descriptions of different modeling techniques of Node Capture attack and various detection and key pre-distribution schemes to invent a new technique to improve network resilience against node capture attacks.


2021 ◽  
pp. 1321-1329
Author(s):  
S. J. Akhila ◽  
N. J. Anasuya

Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2468 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Ikram Ud Din ◽  
Naveed Islam ◽  
Ayman Altameem

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.


2018 ◽  
Vol 2018 ◽  
pp. 1-23 ◽  
Author(s):  
Isma Masood ◽  
Yongli Wang ◽  
Ali Daud ◽  
Naif Radi Aljohani ◽  
Hassan Dawood

Nowadays, wireless body area networks (WBANs) systems have adopted cloud computing (CC) technology to overcome limitations such as power, storage, scalability, management, and computing. This amalgamation of WBANs systems and CC technology, as sensor-cloud infrastructure (S-CI), is aiding the healthcare domain through real-time monitoring of patients and the early diagnosis of diseases. Hence, the distributed environment of S-CI presents new threats to patient data privacy and security. In this paper, we review the techniques for patient data privacy and security in S-CI. Existing techniques are classified as multibiometric key generation, pairwise key establishment, hash function, attribute-based encryption, chaotic maps, hybrid encryption, Number Theory Research Unit, Tri-Mode Algorithm, Dynamic Probability Packet Marking, and Priority-Based Data Forwarding techniques, according to their application areas. Their pros and cons are presented in chronological order. We also provide our six-step generic framework for patient physiological parameters (PPPs) privacy and security in S-CI: (1) selecting the preliminaries; (2) selecting the system entities; (3) selecting the technique; (4) accessing PPPs; (5) analysing the security; and (6) estimating performance. Meanwhile, we identify and discuss PPPs utilized as datasets and provide the performance evolution of this research area. Finally, we conclude with the open challenges and future directions for this flourishing research area.


Sign in / Sign up

Export Citation Format

Share Document