Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network
Keywords:
WSN, Internet of Thing, data sensor confidentiality and integrity, and attribute-based authenticationAbstract
Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN) is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT) technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO) and carbon dioxide (CO2) from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.References
M. F. Othman and K. Shazali, "Wireless sensor network applications: a study in environmental monitoring system," International Symposium on Robotics and Intelligent Sensors 2012 (IRIS ’12), Procedia Engineering 41, pp. 1204-1210, 2012.
R. Mittal and M. P. S. Bhatia, "Wireless sensor networks for monitoring the environmental activities," International Conference on Computational Intelligent and Computing Research (ICCIC), pp. 1-5, 2010.
S. Ferdoush and X. Li, "Wireless sensor network system design using raspberry pi and arduino for environmental monitoring applications," The 9th International Conference on Future Networks and Communications (FNC ’14), Procedia Computer Science 34, pp. 103-110, 2014.
M. U. H. Al Rasyid, B. H. Lee, and A. Sudarsono, "Wireless body area network for monitoring body temperature, heart beat and oxygen in blood," International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 93-96, May, 2015.
N. Fahmi and M. U. H. Al Rasyid, "A wireless sensor network for environmental monitoring gases," Knowledge Creation & Intelligent Computing (KCIC2015), pp. 56-61, March, 2015.
P. Szczechowiak, Security in wireless sensor networks, Lap Lambert Academic Publishing, ISBN: 978-3-8443-9043-8, 2011.
G. V. Crosby, T. Ghosh, R. Murimi, and C. A. Chin, “Wireless body area networks for healthcare: a survey,” International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol. 3, no. 3, June, 2012.
A. Sudarsono, M. U. H. Al Rasyid, H. Hermawan, "An implementation of secure wireless sensor network for e-healthcare
system", International Conference on Computer, Control, Informatics, and Its Application (IC3INA), pp. 75-80, 2014.
A. Sudarsono, P. Kristalina, M. U. H. Al Rasyid, and R. Hermawan, “An implementation of secure data sensor transmission in wireless sensor network for monitoring environmental health,” International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 94-99, 2015.
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption", IEEE Symposium on Security and Privacy, pp.321-334, 2007.
S. Huda, N. Fahmi, A. Sudarsono, and M. U. H. Al Rasyid, "Secure data sensor sharing on ubiquitous environmental health monitoring application," Recent Advancement in Informatics, Electrical and Electronics Engineering International Conference (RAIEIC ‘15), Dec. 10–12, 2015.
A. Sudarsono and T. Nakanishi, “An implementation of secure data exchange in wireless delay tolerant network using attribute-based encryption,” 2nd International Symposium on Computing and Networking (CANDAR ‘14), pp. 536-542, Dec., 2014.
W. Stalling, Network security essentials: applications and standards (4th edition), ISBN-13: 978-0136108054, Pearson, March 22, 2010.
B. A. Forouzan, Cryptography and network security, ISBN-13: 978-0070702080, McGraw-Hill, 2010.
G. V. Crosby, T. Ghosh, R. Murimi, and C. A. Chin, “Wireless body area networks for healthcare: a survey,” International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol. 3, no. 3, June, 2012.
B. Lynn, PBC (Pairing-Based Cryptography) library, http://crypto.stanford.edu/pbc/ [accessed on October, 2015].
J. Bethencourt, A. Sahai, and B. Waters, cpabe toolkit in Advanced Crypto Software Collection, http://hms.isi.jhu.edu/acsc/cpabe/ [accessed on October, 2015].
Libelium - Connecting sensors to the cloud, http://www.libelium.com/ [accessed on August, 2015].
K. Tsai, F. Leu, T. Wu, S. Chiou, Y. Liu, and H. Liu, "A secure ECC-based electronic medical record system", Journal of Internet Services and Information Security (JISIS ‘14), vol. 4, no. 1, pp. 47-57, 2014.
C. Rong and H. Cheng, "A secure data access mechanism for cloud tenants," The 3rd International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 113-119, 2012.
OpenVPN - Open Source VPN, https://openvpn.net/ [accessed on October 2015].
S. Huda, A. Sudarsono, and T. Harsono, “Secure data exchange using authenticated ciphertext-policy attributed-based encryption,” 2015 International Electronics Symposium (IES ‘15), pp. 140-145, 2015.
Published
How to Cite
Issue
Section
License
Copyright Notice
Submission of a manuscript implies: that the work described has not been published before that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication. Authors can retain copyright in their articles with no restrictions. Also, author can post the final, peer-reviewed manuscript version (postprint) to any repository or website.
Since Jan. 01, 2019, IJETI will publish new articles with Creative Commons Attribution Non-Commercial License, under Creative Commons Attribution Non-Commercial 4.0 International (CC BY-NC 4.0) License.
The Creative Commons Attribution Non-Commercial (CC-BY-NC) License permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.