Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2015, Article ID 570185, 9 pages
http://dx.doi.org/10.1155/2015/570185
Research Article

PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors

1School of Information Science and Engineering, Southeast University, Nanjing, Jiangsu 210096, China
2The Third Research Institute of Ministry of Public Security, Shanghai 201204, China
3Accounting Department, Nanjing University, Nanjing, Jiangsu 210093, China

Received 23 April 2015; Accepted 11 June 2015

Academic Editor: Jian-Nong Cao

Copyright © 2015 Changsheng Wan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Cao, Z. Ji, and M. Hu, “An image sensor node for wireless sensor networks,” in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC '05), vol. 2, pp. 740–745, IEEE, Las Vegas, Nev, USA, April 2005. View at Publisher · View at Google Scholar
  2. Sensor Webs, http://sensorwebs.jpl.nasa.gov/.
  3. A. J. Menezes, S. A. Vanstone, and P. C. van Oorschot, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla, USA, 1996.
  4. D. Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), IETF RFC 3174, http://www.rfceditor.org/rfc/rfc3174.txt.
  5. R. Housley, “A 224-bit one-way Hash function: SHA-224,” RFC 3874, IETF, 2004, http://www.rfceditor.org/rfc/rfc3874.txt. View at Google Scholar
  6. National Institute of Standards and Technology, Secure Hash Standard, FIPS 180-2, National Institute of Standards and Technology, Gaithersburg, Md, USA, 2002.
  7. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01), pp. 514–532, 2001.
  8. P. L. Montgomery, “Modular multiplication without trial division,” Mathematics of Computation, vol. 44, no. 170, pp. 519–521, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  9. X. Ren and H. Yu, “Security mechanisms for wireless sensor networks,” International Journal of Computer Science and Network Security, vol. 6, pp. 151–161, 2006. View at Google Scholar
  10. A. S. K. Pathan, H.-W. Lee, and C. S. Hong, “Security in wireless sensor networks: issues and challenges,” in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT '06), vol. 2, pp. 1043–1048, Phoenix Park, Republic of Korea, February 2006. View at Publisher · View at Google Scholar
  11. F. Hu and N. K. Sharma, “Security considerations in ad hoc sensor networks,” Ad Hoc Networks, vol. 3, no. 1, pp. 69–89, 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. A.-S. K. Pathan, H.-W. Lee, and C. S. Hong, “Security in wireless sensor networks: issues and challenges,” in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT '06), vol. 2, pp. 1043–1048, IEEE, Phoenix Park, Republic of Korea, February 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Zia and A. Zomaya, “A security framework for wireless sensor networks,” in Proceedings of the IEEE Sensors Applications Symposium, pp. 49–53, Houston, Tex, USA, February 2006. View at Scopus
  14. J. O. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: a survey,” in Security in Distributed, Grid, and Pervasive Computing, chapter 17, Auerbach Publications, CRC Press, Boca Raton, Fla, USA, 2006. View at Google Scholar
  15. E. Shi and A. Perrig, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38–43, 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2–23, 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Durresi, V. Paruchuri, R. Kannan, and S. S. Lyengar, “Data integrity protocol for sensor networks,” International Journal of Distributed Sensor Networks, vol. 1, no. 2, pp. 205–214, 2005. View at Publisher · View at Google Scholar
  18. I. Kamel, “A schema for protecting the integrity of databases,” Computers & Security, vol. 28, no. 7, pp. 698–709, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Juma, I. Kamel, and L. Kaya, “On protecting the integrity of sensor data,” in Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, pp. 902–905, St. Julian's, Malta, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. H. Chan, A. Perrig, B. Przydatek, and D. Song, “SIA: secure information aggregation in sensor networks,” Journal of Computer Security, vol. 15, no. 1, pp. 69–102, 2007. View at Google Scholar · View at Scopus
  21. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199, Rome, Italy, July 2001. View at Scopus
  22. J. Albath and S. Madria, “Practical algorithm for data security (PADS) in wireless sensor networks,” in Proceedings of the 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE '07), pp. 9–16, Beijing, China, June 2007. View at Publisher · View at Google Scholar
  23. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, Baltimore, Md, USA, November 2004. View at Scopus
  24. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, ACM, Washington, DC, USA, October 2003. View at Publisher · View at Google Scholar
  25. R. Sion, M. Atallah, and S. Prabhakar, “Resilient rights protection for sensor streams,” in Proceedings of the 30th International Conference on Very Large Data Bases, pp. 732–743, Toronto, Canada, September 2004.
  26. H. Guo, Y. Li, and S. Jajodia, “Chaining watermarks for detecting malicious modifications to streaming data,” Information Sciences, vol. 177, no. 1, pp. 281–298, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. I. Kamel and H. Juma, “A lightweight data integrity scheme for sensor networks,” Sensors, vol. 11, no. 4, pp. 4118–4136, 2011. View at Publisher · View at Google Scholar
  28. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 59–64, Washington, DC, USA, October 2004. View at Publisher · View at Google Scholar
  29. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Cryptographic Hardware and Embedded Systems—CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11–13, 2004. Proceedings, vol. 3156 of Lecture Notes in Computer Science, pp. 119–132, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  30. P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption overhead for sensor network nodes,” in Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA '03), San Diego, Calif, USA, September 2003.
  31. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  32. A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for FR-reduction,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 84, no. 5, pp. 1234–1243, 2001. View at Google Scholar · View at Scopus
  33. M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols,” in Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS '93), pp. 62–73, November 1993. View at Scopus
  34. Openssl.org, openssl-1.0.1e.tar.gz, 2013, http://www.openssl.org/source/.