SWOT : Secure Wireless Object Tracking with Key Renewal Mechanism for Indoor Wireless Sensor Network

Rafina Destiarti A, Prima Kristalina, Amang Sudarsono

Abstract


Tracking system is one of concerning issue in wireless sensor network (WSN) application. The accuracy of the location estimation from nodes is important parameter in tracking system. However, many various attacks try to manipulate the estimated location or try to provide false nodes data transmission. The secure and privacy data sharing of the estimation is also become another priority in WSN. Hence, this paper focuses on employing secure wireless object tracking (SWOT) system which is added by the reliable method in privacy data sharing. By proposing the transmission system based cryptographic mechanism, some parameter data that are required in estimated calculation such as RSSI, coordinates, pathloss exponent (PLE), and estimated distance will be hidden using encryption process. Due to the limited computational device, we propose security scheme without raising computational capability. Layered encryption using AES 128, RSA 2048, MD5 and SHA-1 provide high performance authentication and data encryption services for each nodes. Implementing mobile cooperative tracking scenario refers to previous work, the proposed security scheme is efficient in terms of processing time which could not influenced to the estimated location accuracy. Moreover, the authentication protocol which is adopted from one time password scenario can apply the key renewal mechanism for AES 128 and MD5 algorithm. The experimental results show that SWOT system achieves 75.95 ms processing time using Raspberry Pi devices including trilateration algorithm and security process. Meanwhile, PC server consumes around 82.7 ms for decrypting, calculating and showing the estimated position by modified iterated extended Kalman filter (IEKF) algorithm.

Keywords


SWOT System; WSN; Privacy data sharing; Key Renewal; Raspberry Pi.

Full Text:

PDF

References


Long Cheng, et. all, “A Survey Localization in Wireless Sensor Networkâ€, Hindawi Publishing Corporation International Journal of Distibuted Sensor Netwok, vol. 2012, 12 pages, 16 November 2012.

Peng Li, et. all, “Research on Secure Localization Model Bsed on Trust Valuation in Wireless Sensor Networksâ€, Hindawi Publishing Coorporation, Security and Communication Networks, vol. 2017, 12 pages, 8 March 2017.

Alessandro G., and Stefano Q., “Moving Object Detection in Heterogeneous Conditions in Embedded Systemsâ€, Sensors 2017, vol.17, Issue 7, 1 July 2017

Jingsha He, et. All, “ Reputation-Based Secure Sensor Localization in Wireless Sensor Networksâ€, Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 10 pages, 20 May 2014.

Rafina D., Prima K., Amang S. “Cluster-Based PLE Areas for Mobile Cooperative Localization in Indoor Wireless Sensor Networkâ€, International Conference on Information Technology and Electrical Engineering (ICITEE), pp: 112-117, October 2016, IEEE.

Rafina D., Prima K., Amang S., “Modified Iterated Extended Kalman Filter for Mobile Cooperative Tracking Systemâ€, International Journal on Advanced Science Engineering Information Technology, vol.7, no. 3, pp. 980-992, 2017.

Rafiullah Khan, Sarmad Ullah Khan Shahid Khan, and M. Usman Ali Khan, “Localization Performance Evaluation of Extended Kalman Filter in Wireless Sensors Networkâ€, ANT international conference Procedia computer science, pp:117-124, 2014.

Shrikant P. D., Archana R. R., “Analysis of Location Monitoring Techniques with Privacy Preservation in WSNâ€, 4th International Conference on Communication Systems and Network Technology, pp: 649-653, 29 May 2014, IEEE.

Abhishek Das, Laxmipriya M., “Bypassing Using Directional Tranceivers: A Design for Anti-Tracking Source Location Privacy Protection in WSNsâ€, International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp: 39-44, 16 January 2016, IEEE

Gulshan K., Mritunjay K.R., Hye-Jin Kim, and Rahul S., “A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networksâ€, Hindawi Publishing Coorporation, Mobile Information Systems, vol.2017, 12 pages, 26 February 2017.

Gonzalo S., Cristian G. G., and B. Cristina P. G., “Midgar: Study of Communications Security Among Smart Objects using Platform of Heteregeneous Devices for the Internet of Thingsâ€, Future Generation Computer Systems, vol. 74, issue 2017, pp: 444-466, Elsevier.

Yiqin Lu, Jing Zhai, R. Zhu, and Jiancheng Qin, “Study of Wireless Authentication Center With Mied Encryption in WSNâ€, Hindawi Publishing Corporation, Journal of Sensors, vol. 2016, 7 pages, 29 May 2016.

Singoee S. S., “Raspberry Pi Based Security Systemâ€, University of Nairobi, Department of Electrical and Information Engineering, 17 May 2016.

Rafina D., Prima K., Amang S. “Secure Data Transmission Scheme for Indoor Cooperative Localization Systemâ€, International Electronics Symposium (IES), September 2017, IEEE.

Saewoom Lee, and Kiseon Kim, “Key renewal mechanism with Sensor Authentication under Clustered Wireless Sensor Networksâ€, Electronics letters, vol. 51, No. 4, pp: 368-369, 19 February 2015, IEEE

R. J. Kavitha, B. Elizabeth C., “ Secured and Realiable Data Transmission on Multi-hop Wireless Sensor Networkâ€, Springer science+Business Media, LLC 2017, 25 September 2017

M. Thangavel, P. Varalakshmi, S.Sridar, “ An Analysis of Privacy Preservation Schemes in Cloud Computingâ€, International Conference on Engineering and Technology (ICETECH), pp: 146-151, March 2016, IEEE

Lei Wang and Qing Wang, “Secure-Network-Coding-Bsed File Sharing Via Device-to-Device Communicationâ€, Hindawi Publishing Coorporation, Journal of Electrical and Computer Engineering, vol. 2017, 7 pages, 8 June 2017.

Eddy P. N., Rizky R. J. P., and Iman M. R., “SMS Authentication Code Generated by Advanced Encryption Standard (AES) 256 bits Modification Algorithm and One Time Password (OTP) to Activate New Applicant Accountâ€, ICSITECH, 2016, IEEE.

Salem Aljareh, and Anastasios Kavoukis, “Efficient Time Synchronized One-Time Password Scheme To Provide Secure Wake-Up Authentication on Wireless Sensor Netwoksâ€, International Journal of Advanced Smart Sensor Network Sytems (IJASSN), vol.3, No.1, January 2013.

Mostafa Abedi, M. Hassan Y., Farshad P., “ Fast Location Prediction Algorithm Utilized in Enchancing One Time Password Authenticationâ€, IEEE Student Conference on Research and Development, 2012.

Zhang Yu, “The Scheme of Public Key Infrastucture for Improving Wireless Sensor Network Securityâ€, International Conference on Computer Science and Automation, pp: 527-530, 2012, IEEE.

Amang S., Toru N., “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryptionâ€, Journal of Information Processing, vol.25, pp:234-243, February 2017.

Gaochang Z., Xiaolin Y., Bin Z., Wei W., “RSA-Based Digital Image Encryption Algorithm In Wireless Sensor Networkâ€, ICSPS, pp: 640-643, 2010, IEEE.




DOI: http://dx.doi.org/10.18517/ijaseit.8.2.5268

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development