Next Article in Journal
IR-Band Conversion of Target and Background Using Surface Temperature Estimation and Error Compensation for Military IR Sensor Simulation
Next Article in Special Issue
DNN-MVL: DNN-Multi-View-Learning-Based Recover Block Missing Data in a Dam Safety Monitoring System
Previous Article in Journal
Emerging Transistor Technologies Capable of Terahertz Amplification: A Way to Re-Engineer Terahertz Radar Sensors
Previous Article in Special Issue
Coverage-Balancing User Selection in Mobile Crowd Sensing with Budget Constraint
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks

1
College of Cybersecurity, Sichuan University, Chengdu 610065, China
2
College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(11), 2452; https://doi.org/10.3390/s19112452
Submission received: 13 May 2019 / Revised: 26 May 2019 / Accepted: 27 May 2019 / Published: 29 May 2019
(This article belongs to the Special Issue Algorithm and Distributed Computing for the Internet of Things)

Abstract

:
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs.

1. Introduction

Wireless sensor networks (WSNs) are commonly deployed in various practical applications to gather information from a hostile area or placements where human intervention is impossible, and thus can support many new and important areas, such as customer satisfaction survey [1], unmanned aerial vehicles [2], military surveillance [3], and fire detection [4]. However, due to the broadcast nature of the wireless network, sensor data are prone to be intercepted by unauthorized receivers [5,6]. The security of WSN mainly involve decentralized detection whereby the sensors send their measurements to an ally fusion center (AFC) which attempts to detect the state of nature using the data received from all the sensors, meanwhile an enemy fusion center (EFC), also located in a vicinity of the AFC, tries to eavesdrop on the wireless communications between sensors and the AFC [7].
The data confidentiality of WSN has been the subject of many studies using different security strategies [8,9]. To facilitate data encryption using symmetric cryptographic algorithms, the authors in [10,11] proposed novel lightweight anonymous authentication and key agreement (AKA) protocols for WSN, which combines multi-security stages: User registration, sensor node registration, login, authentication, key agreement, and password change. However, the issue of scalability remains a great challenge, since a sensor’s life span is largely determined by its energy supply, which is difficult to satisfy when the resource requirements of traditional encryption methods are at a high security level [12]. Therefore, the security solutions which demand excessive processing costs are not suitable for WSN [13].
With these challenges, several novel efficient approaches have been explored. Aysal and et al. [14] proposed that sensors can intentionally generate errors in the transmitted data to confuse eavesdroppers. They assume that the statistics of the induced error pattern is only available to the AFC, and the eavesdroppers who do not know this, fail to detect the real state from the eavesdropped data. In [15], the sensor outputs are randomly flipped through XOR operations on the local observations and independent binary variables. It is shown that using carefully selected operation parameters, we can hinder the EFC from making correct decisions while maintaining an acceptable error rate at the AFC. In [16], the sensor outputs are randomly mapped to other possible quantification levels according to a probability matrix. It is assumed that the AFC is aware of the matrix but the EFC is not. Therefore, the AFC can optimize its decision result along with the mapping probabilities while imposing a high error rate on the EFC. In [17], the authors developed a security scheme based on sensor censorship to maximize the J-divergence of the EFC while ensuring that the divergence of the AFC is zero. In [18], the authors proposed a lightweight encryption scheme whereby sensors flip their local decisions based on the instantaneous channel (to the AFC) fading gains which are unknown to the EFC due to the independence of the physical communication channels. They showed that information-theoretic perfect secrecy can be achieved in the condition that the global flipping and non-flipping data have the same size. However, the channel state information (CSI) changes from time to time, if the data flipping of each sensor is independently decided by its local CSI statistic, it will be difficult to satisfy the required equivalent condition. Moreover, currently most of the security schemes are designed for the binary hypothesis testing problems in which only two opposite candidate states are considered. However, in many practically-oriented applications, the target systems may contain multiple states and quantification scales. Thus a more general security model with a high efficiency is required to ensure the data confidentiality of WSN.
In the paper, we proposed a security data propagation method based on pseudo-random encryption (SDPR) for WSN. The underlying idea is that since most of the random functions generate stochastic sequence in a pseudo-random way, such that as long as the input initial random seed is the same, the functions will always return a same random digital sequence; it is nearly impossible to guess the generated sequence without the seed, even when the employed function is known. Furthermore, the time complexity of the pseudo-random function is much lower than traditional high security encryption algorithms, which makes them more applicable to the resource constrained environment of WSN. It should be noted that pseudo-functions are utilized to control the data interfering process in our method SDPR. The detailed discussion of pseudo-functions is out of the scope of the paper, but anyone interested in it can refer to [19,20,21].
Firstly the typical security problem of distributed binary hypothesis testing in WSN is considered. It is assumed that the sensors report their measurements in the form of binary bits and sequentially transmit them to the AFC. At the beginning of a sensing cycle, the AFC and each sensor s i select an unique seed (for pseudo-random functions) based on the channel state information. In each duplex time, s i is randomly assigned to the flipping or non-flipping group based on the output of its random function. The sensors in the non-flipping group directly transmit their binary results to the AFC, while the others perform data encryption in a way to flip their quantized bits (zero turns to one and vice versa). Therefore, the AFC can recover the flipped data while the EFC can not, and the flipping will only prevent the EFC from fusing the correct result. Note that the seeds can be safely decided by the sensors and AFC based on the observation of the main channel state information. In [22,23,24], the wireless channel gains are considered as common randomness exclusively shared by the transmitter and legitimate receiver using the time-division duplexing (TDD) protocol. Specifically, in [18], the magnitude of the channel gain (MCG) is applied to the negotiation of secret keys. As the main channels (sensors to the AFC) and eavesdropping channels (sensors to the EFC) are statistically independent when the EFC is located more than a half wavelength apart from both the sensors and AFC, it is impossible for the EFC to eavesdrop the seed information.
The scheme is then extended to a more common scenario with multiple quantification scales and candidate states. Our goal is to achieve data confidentiality of WSN by ensuring that the data observed by the EFC is useless for detection purposes. It should be noted that the proposed approach has minimal processing requirements and does not introduce any communication overhead.

2. The Description of the Security Model

2.1. System Model

The proposed security scheme SDPR for binary hypothesis testing is referred to as SDPR_B. The sensors observe a common target state which can be θ 0 or θ 1 , and the measurement of each sensor s i is quantized into binaries (local decision u i ) based on the measurement and decision threshold: If the measurement is less than the decision threshold, then u i = 1 ( s i detected θ 1 ), otherwise u i = –1 ( s i  detected θ 0 ). Let p ( u i = 1 | θ 1 ) and p ( u i = 1 | θ 0 ) denote the local detection rate p d i and false alarm rate p f i of the i-th sensor respectively. Usually, the environment sensing performance p d i and p f i can be known in advance both by the AFC and EFC. In order to prevent the EFC from detecting the real state, the sensors in the flipping group flipped their binary outputs before sending to the AFC.

2.2. Flipping Encryption

A sensor is assigned to the flipping group if the output of its local pseudo-random function r a n d ( · ) is in the flipping domain [ τ 4 , τ 3 ] . Usually the output sequence of r a n d ( · ) is decided by its initial s e e d . Therefore, in order to make sure that the AFC and sensors can synchronously generate the same random sequences at the beginning of each sensing cycle, the AFC and each corresponding sensor s i decide s e e d i based on the observation of the instantaneous channel state of the i-th main channel ( s i  to AFC), such that s e e d i = g i , where g i can be the magnitude of the channel gain or the CQI (channel quality indicator) level. As g i is only known by the AFC and s i due to the channel independence between the main channels and the eavesdropping channels [18], the EFC cannot eavesdrop s e e d i through the captured data in WSN.
Before the data transmission in each duplex time, the AFC first broadcasts pilot signals with flipping thresholds: { τ 1 , τ 2 , τ 3 , τ 4 } , where { τ 1 > τ 2 > τ 3 > τ 4 } , to trigger the sensors to report their local decisions in a time-division duplex (TDD) manner. In particular, the thresholds remain constant during a duplexing time for pilot transmission and sensors’ transmissions, say one block, and changes independently across blocks and sensors. Once the i-th sensor received the pilot signal, it immediately generates a random value φ i ( t ) by r a n d ( · ) as shown in Equation (1):
φ i ( t ) = r a n d ( s e e d i ) , i f t = 1 r a n d ( φ i ( t 1 ) ) , i f t > 1
The encrypted data (output) of the i-th sensor s i is denoted by x i . If τ 2 < φ i ( t ) < τ 1 , then s i is put into the non-flipping group and output x i = u i . On the contrary, s i is assigned to the flipping group when τ 4 < φ i ( t ) < τ 3 , and its output is x i = u i , which is a bit-flipping version of the quantized data. The remaining sensors are dormant. Note that the EFC can also receive the sensor outputs through eavesdropping channels due to the broadcast nature of WSN. We emphasize that since the encryption is based on the pseudo-random functions’ outputs, which are different between sensors, the EFC cannot distinguish the flipped data from the original outputs even if it has eavesdropped the pilot packets from the AFC. As a result, we expect that the EFC fails to detect the target state. In the next section, we will show that the AFC can correctly fuse the received data whereas the EFC totally failed to utilize the captured data.

2.3. The Fusion Result of the AFC

In this section, the fusion result of the AFC based on log-likelihood ratio (LLR) is analyzed. Suppose the number of activated sensors in one duplexing time is k ( k N ) , then the input vector, which contains data from all the activated sensors, for the decision fusion is z A = [ z 1 A z k A ] , and according to [25] the LLR-based fusion rule at the AFC is given by:
Λ = l o g P ( z A | θ 1 ) P ( z A | θ 0 ) = i = 1 k l o g f ( z i A | θ 1 ) f ( z i A | θ 0 ) θ 1 θ 0 0
f ( . | . ) is the conditional probability density function. As the sensor outputs have been randomly flipped, z i A may not be the original sensor quantification. Note that the AFC holds the initial s e e d i of each sensor. Then the original quantized measurement u i A of z i A , i = 1 k , can be recovered by Equation (3):
u i A = s i g n ( z i A ) , i f τ 2 < φ i ( t ) = r a n d ( φ i ( t 1 ) ) < τ 1 s i g n ( z i A ) , i f τ 4 < φ i ( t ) = r a n d ( φ i ( t 1 ) ) < τ 3
where sign( z i A ) represents the sign of z i A . Let S 1 = { i | z i A = 1 , τ 2 < φ i ( t ) < τ 1 } , S 2 = { i | z i A = 1 , τ 2 < φ i ( t ) < τ 1 } , S 3 = { i | z i A = 1 , τ 4 < φ i ( t ) < τ 3 } , and S 4 = { i | z i A = 1 , τ 4 < φ i ( t ) < τ 3 } . Then the left side of Equation (2) can be rewritten as:
Λ = i S 1 l o g f ( z i A | θ 1 ) f ( z i A | θ 0 ) + i S 2 l o g f ( z i A | θ 1 ) f ( z i A | θ 0 ) + i S 3 l o g f ( z i A | θ 1 ) f ( z i A | θ 0 ) + i S 4 l o g f ( z i A | θ 1 ) f ( z i A | θ 0 )
When i S 1 , it means that the original quantification u i A is not flipped and u i A = z i A = 1 , therefore the LLR value of the i-th sensor in S 1 becomes:
i S 1 l o g f ( z i A | θ 1 ) f ( z i A | θ 0 ) = i S 1 l o g f ( u i A = 1 | θ 1 ) f ( u i A = 1 | θ 0 ) = i S 1 l o g p d i p f i
In the same manner, we can compute the LLR values in different set S 2 S 4 , finally the LLR based fusion rule can be reduced to the following one:
Λ = l o g f ( z A | θ 1 ) f ( z A | θ 0 ) = i S 1 l o g p d i p f i + i S 2 l o g 1 p d i 1 p f i + i S 3 l o g 1 p d i 1 p f i + i S 4 l o g p d i p f i θ 1 θ 0 0
Note that this approximation can be viewed as a modified version of the Chair–Varshney fusion rule, which only utilizes local false alarm and detection probabilities [25].

3. Security Analysis

In the security analysis of the proposed scheme, the main concern is whether the EFC can get useful information from the eavesdropped data. At the EFC, the captured data from the i-th sensor is denoted by z i E and the input vector for EFC’s fusion rule is z E = [ z 1 E , z 2 E z k E ] . And the final decision of EFC is is shown in Equation (7).
L = l o g f ( z E | θ 1 ) f ( z E | θ 0 ) θ 1 θ 0 0
From Equation (7) we can see that data confidentiality can be achieved by deriving f ( z E | θ 1 ) equals f ( z E | θ 0 ) , which makes the LLR value at the EFC always equals to zero, and the EFC will totally ignore the data since it cannot make a final decision for the binary hypothesis testing problem when L = 0.
Obviously, the sensor outputs are independent with each other, and f ( z E | θ 1 ) = i = 1 k f ( z i E | θ 1 ) . Then f ( z i E | θ 1 ) is computed with the total probability theorem, as shown in Equation (8).
f ( z i E | θ 1 ) = u i x i f ( z i E , x i , u i | θ 1 ) = u i p ( u i | θ 1 ) x i f ( z i E , φ i , x i | u i , θ 1 ) d φ i = u i p ( u i | θ 1 ) x i f ( z i E | φ i , x i , u i , θ 1 ) · f ( φ i ) · p ( x i | φ i , u i , θ 1 ) d φ i
where φ i denotes the value of the pseudo-random function r a n d ( · ) with probability density function f ( φ i ) , u i and x i represent the original measurement and final output of the i-th sensor s i respectively. z i E  is conditionally independent of u i , φ i , and θ 1 when x i is known, while x i is conditionally independent of θ 1 when φ i , u i are known. Remember that only the sensors whose random values φ i belong to [ τ 2 , τ 1 ] or [ τ 4 , τ 3 ] are activated in a duplex time, and we can derive f ( z i E | θ 1 ) as follows:
f ( z i E | θ 1 ) = u i p ( u i | θ 1 ) x i f ( z i E | x i ) · ( τ 2 τ 1 f ( φ i ) · p ( x i | φ i , u i ) d φ i + τ 4 τ 3 f ( φ i ) · p ( x i | φ i , u i ) d φ i )
Since the EFC cannot be aware of φ i and its probability density function f ( φ i ) , it should take into account all the flipping cases: (1) φ i [ τ 2 , τ 1 ] , u i = ± 1 , x i = u i ; (2) φ i [ τ 4 , τ 3 ] , u i = ± 1 , x i = u i . To simplify the expression, let λ 1 and λ 2 represent τ 2 τ 1 f ( φ i ) · p ( x i | φ i , u i ) d φ i and τ 4 τ 3 f ( φ i ) · p ( x i | φ i , u i ) d φ i respectively, then we have:
f ( z i E | θ 1 ) = f ( z i E | x i = 1 ) ( 1 p d i ) λ 1 + f ( z i E | x i = 1 ) p d i λ 1 + f ( z i E | x i = 1 ) ( 1 p d i ) λ 2 + f ( z i E | x i = 1 ) p d i λ 2
If λ 1 and λ 2 satisfy λ 1 = λ 2 = λ , then,
f ( z i E | θ 1 ) = f ( z i E | x i = 1 ) λ + f ( z i E | x i = 1 ) λ
In the same manner, we can compute f ( z i E | θ 0 ) as follows,
f ( z i E | θ 0 ) = f ( z i E | x i = 1 ) λ + f ( z i E | x i = 1 ) λ
From Equation (9) we can see that the AFC can easily ensure λ 1 = λ 2 as long as the width τ 1 τ 2 = τ 3 τ 4 . And when λ 1 = λ 2 = λ , it means that the transmitted data from the flipping and non-flipping groups arrive at the EFC with the same size, and the proposed transmission scheme achieves f ( z i E | θ 1 ) = f ( z i E | θ 0 ) . Consequently, the EFC cannot make the final decision for the nature state θ 1 or θ 0 , and it has to totally ignore the captured data.

4. Generalization to the Multiple Decisions

Besides the binary hypothesis testing problem discussed in previous sections, there are many WSN applications involved multiple states Θ = { θ 1 , θ 2 θ m } , and the sensor quantifications also have multiple scales Ξ = { υ 1 , υ 2 υ n } . Usually each scale corresponds to an unique conditional probability in different state. Then the AFC needs to make a decision from the multiple candidate states while the EFC also tries to eavesdrop the natural state based on the captured data.
Suppose the received vector is Z = [ z 1 , z 2 z k ] , z i Ξ , according to Bayes rules [26], the state which has the maximum posterior probability is selected as the final decision.
max j P ( Z | θ j ) P ( θ j ) i = 1 n P ( Z | θ i ) P ( θ i )
Without loss of generality, we assume that the prior probability of each state is equal, therefore Equation (13) can be simplified to:
max j Π i = 1 k P ( z i | θ j )
In order to prevent the EFC from forming the correct fusion result of Equation (14), the proposed SDPR is extended for the case of multiple scales (referred to SDPR_M). As shown in Figure 1, the measurement results are automatically mapped to other quantification scales based on a 1 × n mapping matrix ϕ before sending to the AFC. Consequently, the AFC recovers the received data using an inverse mapping before data fusion. To make sure that the AFC and each sensor s i keep the same mapping matrix ϕ i , firstly, they select an initial s e e d i in a similar manner as described in Section 2 for a pseudo-random function randInt (usually, r a n d I n t ( s e e d i ) = m i n + r a n d ( s e e d i ) ( m a x m i n ) ), which uniformly generates random integer numbers in a given range [min, max] based on the s e e d i , and r a n d I n t always outputs the same sequence of numbers with the same s e e d i . And then, in the t-th time-division sensor s i generates a random sequence and forms ϕ i using the following process:
  • Step 1 initialize ϕ i = n u l l , R = n u l l , j = 2, n = number of scales;
  • Step 2 R ( 1 ) = r a n d I n t ( s e e d i ) , t e m p = R ( 1 ) ;
  • Step 3 if j > n update; s e e d i = r a n d I n t ( R ( n ) ) , go to step 5, else t e m p = r a n d I n t ( t e m p ) , endif;
  • Step 4 if k < j , R ( k ) t e m p , R ( j ) = t e m p , j = j + 1 , endif, go to Step 3;
  • Step 5 set ϕ i = { Ξ ( R ( 1 ) ) , Ξ ( R ( 2 ) ) Ξ ( R ( n ) ) } .
As shown in Equation (15), if the quantified result of sensor s i is u i = υ j , then the final output x i is mapped to another scale x i = ϕ i ( j ) based on the mapping matrix.
x i = ϕ i ( j ) , i f u i = υ j , w h e r e ϕ i ( j ) , υ i Ξ
After the data mapping, the output is sent to the AFC to form a decision using Equation (14). Then we analyze the security of the mapping schemes for multiple states and scales.
Firstly, it is assumed that the outputs are transmitted through error-free channels, and the received data from the i-th sensor is z i = x i . Let us consider the probability of P ( z i | θ j ) in Equation (14).
P ( z i | θ j ) = u i P ( z i , u i | θ j ) = u i P ( u i | θ j ) P ( z i | u i , θ j ) = ( a ) u i P ( u i | θ j ) P ( Φ ( u i ) = z i | u i , θ j ) = ( b ) u i P ( u i | θ j ) P ( Φ ( u i ) = z i )
where Φ ( . ) is a mapping function defined on matrix ϕ i , such that Φ ( ν k ) = ν t if ϕ i ( k ) = ν t and P ( Φ ( u i ) = z i ) represents the probability of mapping scale u i to z i . (a) Follows from the fact that the final output of s i is decided by the local measurement u i and the mapping matrix; (b) follows the fact that the mapping probability of P ( Φ ( u i ) = z i ) is independent of u i and θ j when the mapping matrix Φ is known. Let P ( Φ ( u i ) = z i ) = λ i , then P ( z i | θ j ) = u i P ( u i | θ j ) λ i .
As the random function r a n d I n t generate integers uniformly between 1 and n, it can be assumed that the probability of mapping υ i to any υ j , i , j = 1 , 2 n is the same and λ 1 = λ 2 = λ n = λ . Therefore, Equation (16) is simplified as:
P ( z i | θ j ) = u i P ( u i | θ j ) λ = λ
Then we discuss a more complex scenario that the channel is interfered by noise, and for the i-th sensor, the received data is given by z i = h i · x i + n i , where h i is the channel gain and n i is the signal noise. If the channel is not error-free, z i may not equal x i , and f ( z i | θ j ) in Equation (14) can be derived as follows:
P ( z i | θ j ) = u i x i P ( z i , x i , u i | θ j ) = u i P ( u i | θ j ) x i P ( x i | u i , θ j ) P ( z i | x i , u i , θ j ) = ( a ) u i P ( u i | θ j ) x i P ( x i | u i ) P ( z i | x i ) = ( b ) u i P ( u i | θ j ) x i P ( Φ ( u i ) = x i ) P ( z i | x i )
where (a) follows the fact that z i is independent of u i and θ j when x i is known, and (b) follows from the fact that the output of x i is decided by u i and local mapping matrix. As we have discussed in Equation (17), the probability of mapping u i to any quantification scale can be the same, and P ( z i | θ j ) is further derived as:
P ( z i | θ j ) = u i P ( u i | θ j ) x i λ P ( z i | x i )
The probability of P ( z i | x i ) in Equation (19) is decided by the physical state of the wireless channel, including channel gains, noise level, etc. However, the physical channel can be assumed to be stable during one duplex time, and x i P ( z i | x i ) is a constant value P i , which is not related to the candidate state θ j . Finally we can have:
P ( z i | θ j ) = u i P ( u i | θ j ) x i λ P ( z i | x i ) = λ · P i
The AFC can recover the original quantifications based on reverse mapping of ϕ i , but the EFC dose not know the mapping matrix, and has to fuse the raw data using Equation (14). According to Equations (17) and (19), the EFC for any input vector Z = [ z 1 , z 2 z k ] and candidate state θ j , j = 1 , 2 m , 1) in error-free channels P ( Z | θ j ) = Π i = 1 k P ( z i | θ j ) = λ k ; 2) in noise channels P ( Z | θ j ) = Π i = 1 k P ( z i | θ j ) = λ k · Π t = 1 k P t . For both of the two cases, the conditional probability of the fusion rules in Equation (14) is all the same no matter what the candidate state θ j is. Therefore, it will be nearly impossible for the EFC to generate correct decisions based on the captured sensor data.

5. Simulation Results

5.1. Experiments on Binary Hypothesis Testing

In this section, a group of simulations were carried out to test whether SDPR_B could prevent the EFC from eavesdropping the real state, while the AFC could correctly fuse the sensor outputs when there were only two candidate states.
The comparison objects include security fusion rules proposed in [18] (referred to Jeon), in which the sensors’ binary decisions are flipped based on instantaneous channel gains in the main channels to the AFC. In addition, the performance of the Optimum-LLR proposed in [26], where the optimum LLR based fusion rule is derived without the presence of the EFC, is considered as the lower bounds of the error probability.
For ease of comparisons, we adopted a similar condition as in [18], the sensors were deployed into a star-like topology and the main channel gains were assumed to follow a Rayleigh distribution. Furthermore, the sensors have the same local detection performances p f = 0.2 ,   p d = 0.9 . The total error probability by P ε = Δ ( 1 P d ) + ( 1 Δ ) P f is taken as the criterion of fusion performance, where  P d and P f are the detection and false alarm probabilities at the fusion center, respectively, and Δ = 0.5 is a weighting factor.
The first round of comparisons were carried out in ideal conditions that the channel gains strictly followed the Rayleigh distribution. The results are shown in Figure 2, Figure 3 and Figure 4, which depict the weighted error probability of the AFC and EFC with different signal to noise rate (SNR) and sensor number.
From Figure 2 and Figure 4, we can see that Optimum-LLR achieved the lowest error probability (lower bound). However, Optimum-LLR does not take any security mechanism against eavesdropping, thus the EFC can get the same low error rate as that achieved by the AFC. For SDPR_B, its error probability at the AFC was near to that of Optimum-LLR, and obviously better than Jeon. That is because the AFC could recover the flipped data using inverse flipping before data fusion. On the other hand, from Figure 3 and Figure 5, we can see that the error probability of the EFC was always near 50% even with high SNR and many sensors, because it could not distinguish the flipped data from the original outputs, which completely interfered its data fusion. Therefore, in the ideal condition, both SDPR_B and Jeon achieved information-theoretic perfect secrecy.
To further test the proposed schemes, we designed another group of comparisons that simulated a more realistic network environment where the channel gains continuously changed and we had no prior-knowledge of the probability distribution of the gains. The results are shown in Figure 6, Figure 7, Figure 8 and Figure 9.
The figures depict that, at the AFC, the error probabilities of SDPR_B and Jeon decrease as the SNR and sensor number increased. Furthermore, for the EFC, the error probability of SDPR_B is always near to 50%, but compared with the results in the ideal condition, the error probability of Jeon apparently decreased. In the real situations, the channel gain, which affects the data flipping of Jeon, dynamically change due to power consumption, external disturbance, etc. Therefore, the numbers of flipping data and non-flipping data of Jeon are not equal any more, resulting in less disturbance to the EFC. As shown in Figure 7 and Figure 9, the average error probability is reduced to 40%, which means the confidentiality of Jeon is compromised. In addition, the data flipping of SDPR_B is controlled by the pre-deployed random function, and when the AFC sets τ 1 τ 2 = τ 3 τ 4 in Equation (9), it ensures that the sizes of the flipped and non-flipped data in the EFC are the same and the two sets of data are self-contradictory, resulting in the error probability of the EFC to be always near 50%, which is a necessary condition of ideal confidentiality for binary hypothesis testing in WSN.

5.2. Experiment on Multiple Scales

In this section, we tested the security schemes involved in multiple scales and states. Our goal is to demonstrate that SDPR_M proposed in the paper can ensure that the fusion result of EFC provides no more information than the priori-knowledge of the natural state, while the AFC can make a correct decision.
Our experiment simulated a common scenario in the industry area: n sensors quantize the vibration velocity of a mechanical system and periodically report the quantifications to the fusion center through WSN. The velocity scale ranges from S = { 1 , 2 100 } , while the candidate states consists of θ 1 , θ 2 , θ 3 , θ 4 , corresponding to ‘Idle’, ‘Busy’, ‘High Load’, and ‘Broken’ respectively. As shown in Figure 10, the sensor quantifications in different state are assumed to follow Gauss distributions, such that p ( x | θ 1 ) N ( 12.5 , 8 ) , p ( x | θ 2 ) N ( 37.5 , 8 ) , p ( x | θ 3 ) N ( 62.5 , 8 ) , p ( x | θ 4 ) N ( 87.5 , 8 ) and, p ( x | θ i ) = x 1 x f ( x ) θ i d x . Without loss of generality, the priori-probability of each state is assumed to be the same.
In each round of the simulation, one state θ i , i { 1 , 2 , 3 , 4 } is randomly selected and then the sensor measurements [ u 1 , u 2 u n ] , u i S are generated based on the probability density function p ( x | θ i ) . As described in Section 4, before data transmission, sensor s i , i = 1 n mapped its measurement u i to another scale based on its mapping matrix to confuse the EFC. An example of data mapping is shown in Figure 11, each rows in (a) represent the original measurements of 20 sensors for a given state θ i , while the rows in (b) are the corresponding mapped results which are totally different from the original ones. Note that the probability of mapping a scale to any one in S is the same. The theoretical number of possible mapping matrix is 100 ! = 9.3326215443944 e + 157 and it is nearly impossible for the EFC to recover the original quantifications through brute-force analyzing of the captured data (it will cost more than 3 e + 132 years, even if America’s newest top supercomputer ’SUMMIT’ is employed to the analysis).
For comparisons, we employed a native Bayes decision fusion rules [27] which is derived by using the principle of maximum posterior probability without data mapping.
In the first group of comparisons, 30% of the sensor outputs are interfered by White Gaussian noise. Figure 12 depicts the average error probability with different sensor number for 10 rounds of simulations. We see that in [27] as a lower error bound of the AFC, however the EFC has a similar performance too due to the lack of data encryption. Therefore, the EFC can easily eavesdrop the target state based on the captured data. The figure shows that the AFC of SDPR_M has a similar performance with that of [27]. Meanwhile, the EFC of SDPR_M has an apparently higher error probability and the corresponding true detection rate is near 25%, which is the priori-knowledge of the distribution of the 4 states. That is because in SDPR_M, the AFC and sensors deployed same pseudo-random functions and initial seeds, which ensures that they also have same mapping matrices and the AFC can recover the original quantifications through inverse mapping of the received data. In addition, the initial seeds are selected based on the instantaneous state information of the main channels (sensors to AFC). The EFC is unaware of the mapping matrix because of the independence between the main and eavesdropper channels. Therefore the data mapping only causes interference to the EFC’s fusion results.
We can see similar results in Figure 13, which depicts the error probability with different SNRs. The results present a similar trend that the AFC of SDPR_M has a performance close to [27], while the EFC can still not get useful information about the state even with high SNR. The experiment confirmed the capabilities of SDPR_M in that it ensures the security of WSN’s open transmissions while reserving the high performance of the AFC.
To see the performance superiority of the proposed scheme, another group of simulations were carried out to compare SDPR_M with the scheme proposed in [16] where the sensor outputs are randomly mapped to other scales using an optimized stochastic cipher matrix Φ . Its encryption is converted to solve the following optimization problem of Φ :
Φ = a r g Φ m a x J A ( α 1 Φ Δ | | α 2 Φ Δ ) subject   to : 1 ) 0 ϕ i j 1 , 2 ) Φ 1 m × 1 = 1 m × 1 , and 3 ) ( q 1 α 1 + q 2 α 2 ) Φ Δ = 1 / m 1 1 × m
where J A is the detection gain of the AFC, q 1 and q 2 represent priori-probability of two candidate states θ i , i = 1,2, α i = [ p ( x 1 | θ i ) , p ( x 2 | θ i ) p ( x m | θ i ) ] represents the post-probability vector of multiple scales in state θ i , ϕ i j is the probability of mapping a scale i to another level j, and Δ is the transition probability matrix. In addition, the native Bayes fusion rule [27] without data encryption is also compared and its results are taken as a lower bound of the error probability.
The proposed scheme in [16] is limited to two candidate states. For fair comparisons, it is assumed that there are only two states θ 1 , θ 2 , and the quantification scales { 1 , 2 100 } are assumed to follow Gauss distributions in different state: p ( x | θ 1 ) N ( 37.5 , 12 ) , and p ( x | θ 2 ) N ( 62.5 , 12 ) .
The comparison results are depicted in Figure 14 and Figure 15. From the figures, we can see that both SDPR_M and the scheme proposed in [16] ensure that the error probability is around 50% at the EFC. Furthermore, the performance of SDPR_M at the AFC is quite similar to the lower bound shown as the red line. However, the performance at the AFC of [16] obviously deteriorated, especially when the sensor number is less than 20, the error probability is higher than 20%. That is because the optimization problem of the stochastic cipher matrix Φ in [16] is NP-hard, and usually its heuristical solutions are suboptimal, which results in the non-trivial degeneration of performance across a wide range of sensor numbers (SNR values). Although the scheme in [16] achieved good confidentiality, it sacrificed the performance of the AFC. Whereas SDPR_M realized a similar security level that maintained data availability of the AFC. In addition, it should be noted that in many applications, both the data confidentiality and the data reliability should be taken into consideration. Therefore, from this point of view our method can be more applicable.

6. Conclusions

In the paper, a lightweight scheme was proposed to protect data confidentiality in a distributed sensor network. The data was supposed to be transmitted over open and insecure channels with the presence of an enemy fusion center EFC, which tried to gather all the transmitted data to form its own decision regarding the state of nature. To prevent the EFC from eavesdropping, the security scheme was designed by exploiting randomness of data flipping (mapping). The main idea was that the activated sensors change their quantized outputs in a random way based on pseudo-random functions known by sensors and the AFC. Thus the EFC who captured the sensor data over the open channels failed to perform data decryption since it could not distinguish the original output from the flipped data. The theory analysis and experimental results demonstrated that the AFC could appropriately decrypt the data, but for the EFC, even with high SNR and large number of sensors, it still could not make right decisions on the state.
We claim that due to the simplicity and low complexity, the proposed solution could be deployed in many resource-limited applications of WSN, including natural disaster monitoring, battlefield situation awareness, remote control of unmanned aerial vehicle, etc. Furthermore, the new pseudo-encryption model opens several future research lines. Being a generalization of data-flipping encryption, we can expect stochastic data flipping to allow better confidentiality while reserving data utility. Exploring the capability limit of pseudo random flipping for data confidentiality is another possible follow-up of this article. Finally, it should be noted that our method is preferred in the condition that the number of sensor quantification scales were stable and known in advance, and how to improve the proposed method for the unpredictable and unstable environment of WSN will be taken into consideration in our future work.

Author Contributions

Conceptualization, W.C. and L.L.; methodology, W.C.; software, W.C., Y.L.; validation, Y.L.; formal analysis W.C. and T.L.; investigation, W.C. and T.L.; data curation, Y.L.; writing—original draft preparation, L.L.; writing—review and editing, W.C.

Funding

This work was supported by the National Key Research and Development Program of China (Grant no. 2016YFB0800605 and 2016YFB0800604) and the Natural Science Foundation of China (Grant no. 61872255, U1736212 and 61572334).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Reyes-Menendez, A.; Palos-Sanchez, P.; Saura, J.R.; Martin-Velicia, F. Understanding the Influence of Wireless Communications and Wi-Fi Access on Customer Loyalty: A Behavioral Model System. Wirel. Commun. Mob. Com. 2018, 2018, 1–16. [Google Scholar] [CrossRef]
  2. Saura, J.R.; Reyes-Menendez, A.; Palos-Sanchez, P. Mapping multispectral Digital Images using a Cloud Computing software: Applications from UAV images. Heliyon 2019, 5, 1–22. [Google Scholar] [CrossRef] [PubMed]
  3. Shigen, S.; Hongjie, L.; Risheng, H.; Athanasios, V.V.; Yihan, W.; Qiying, C. Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  4. Murat, D.; Yunus, O.; Cevat, B. Fire detection systems in wireless sensor networks. Procedia Soc. Behav. Sci. 2015, 195, 1846–1850. [Google Scholar]
  5. Huang, D.J.; Teng, W.C. A defense against clock skew replication attacks in wireless sensor networksoriginal research article. J. Netw. Comput. Appl. 2015, 39, 26–37. [Google Scholar] [CrossRef]
  6. He, D.; Chan, S.; Guizani, M. Accountable and privacy–enhanced access control in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2015, 14, 389–398. [Google Scholar] [CrossRef]
  7. Soltanmohammadi, E.; Oroojiand, M.; Naraghi–Pour, M. Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes. IEEE Trans. Inf. Forensics Secur. 2013, 8, 205–215. [Google Scholar] [CrossRef]
  8. Moosavi, H.; Bui, F.M. A game–theoretic framework for robust optimal intrusion detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1367–1379. [Google Scholar] [CrossRef]
  9. Uluagac, A.S.; Beyah, R.A.; Copeland, J.A. Secure source–based loose synchronization (sobas) for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 803–813. [Google Scholar] [CrossRef]
  10. Yanrong, L.; Lixiang, L.; Haipeng, P.; Yixian, Y. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Sensors 2016, 16, 837–8576. [Google Scholar]
  11. Dawei, Z.; Haipeng, P.; Lixiang, L.; Yixian, Y. A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 2014, 78, 247–269. [Google Scholar]
  12. Akyildiz, I.F.; Su, Y.S.W.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–442. [Google Scholar] [CrossRef]
  13. Incebacak, D.; Bicakci, K.; Tavli, B. Evaluating energy cost of route diversity for security in wireless sensor networksoriginal. Comput. Stand. Interfaces 2015, 39, 44–57. [Google Scholar] [CrossRef]
  14. Aysal, T.C.; Barner, K. Sensor data cryptography in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2008, 3, 273–289. [Google Scholar] [CrossRef]
  15. Pour, M.N.; Nadendla, V. Secure detection in wireless sensor networks using a simple encryption method. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28–31 March 2011; pp. 114–119. [Google Scholar]
  16. Soosahabi, R.; Naraghi–Pour, M.; Perkins, D.; Bayoumi, M.A. Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 375–385. [Google Scholar] [CrossRef]
  17. Marano, S.; Matta, V.; Willett, P.K. Distributed detection with censoring sensors under physical layer secrecy. IEEE Trans. Signal Process. 2009, 57, 1976–1986. [Google Scholar] [CrossRef]
  18. Jeon, H.; Choit, J.; McLaughlin, S.W.; Ha, J. Channel aware encryption and decision fusion for wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 619–625. [Google Scholar] [CrossRef]
  19. Matsumoto, M.; Nishimura, T. Mersenne Twister: A 623–Dimensionally Equidistributed Uniform Pseudo–Random Number Generator. ACM Trans. Model. Comput. Simul. 1998, 8, 3–30. [Google Scholar] [CrossRef]
  20. Naor, M. Number–Theoretic Constructions of Efficient Pseudo–Random Functions. J. ACM 2004, 51, 231–262. [Google Scholar] [CrossRef]
  21. Wichmann, B.A.; Hill, I.D. An Efficient and Portable Pseudo–random Number Generator. J. R. Stat. Soc. Ser. C Appl. Stat. 1982, 31, 188–190. [Google Scholar]
  22. Liu, Y.; Draper, S.C.; Sayeed, A.M. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1484–1497. [Google Scholar] [CrossRef]
  23. Wallace, J.; Sharma, R. Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis. IEEE Trans. Inf. Forensics Secur. 2010, 5, 381–392. [Google Scholar]
  24. Ye, C.; Mathur, S.; Reznik, A.; Shah, Y.; Trappe, W.; Mandayam, N. Information–theoretically secret key generation for fading wireless channels. IEEE Trans. Inf. Forensics Secur. 2010, 5, 240–254. [Google Scholar]
  25. Varshney, P. Distributed Detection and Data Fusion, 1st ed.; Springer: Berlin, Germany, 2005; pp. 180–189. [Google Scholar]
  26. Chen, B.; Jiang, R.; Kasetkasem, T.; Varshney, P.K. Channel aware decision fusion in wireless sensor networks. IEEE Trans. Signal Process. 2006, 52, 3454–3458. [Google Scholar] [CrossRef]
  27. Guerriero, M.; Svensson, L.; Willett, P. Bayesian Data Fusion for Distributed Target Detection in Sensor Networks. IEEE Trans. Signal Process. 2010, 58, 3417–3421. [Google Scholar] [CrossRef]
Figure 1. Procedure of pseudo-random encryption (SDPR_M).
Figure 1. Procedure of pseudo-random encryption (SDPR_M).
Sensors 19 02452 g001
Figure 2. The error probabilities at the ally fusion center (AFC) as a function of signal to noise rate (SNR) in ideal channel conditions.
Figure 2. The error probabilities at the ally fusion center (AFC) as a function of signal to noise rate (SNR) in ideal channel conditions.
Sensors 19 02452 g002
Figure 3. The error probabilities at the enemy fusion center (EFC) as a function of SNR in ideal channel conditions.
Figure 3. The error probabilities at the enemy fusion center (EFC) as a function of SNR in ideal channel conditions.
Sensors 19 02452 g003
Figure 4. The error probabilities at the AFC with an increasing number of sensors in ideal channel conditions.
Figure 4. The error probabilities at the AFC with an increasing number of sensors in ideal channel conditions.
Sensors 19 02452 g004
Figure 5. The error probabilities at the EFC with an increasing number of sensors in ideal channel conditions.
Figure 5. The error probabilities at the EFC with an increasing number of sensors in ideal channel conditions.
Sensors 19 02452 g005
Figure 6. The error probabilities at the AFC as a function of SNR in time-varying channel conditions.
Figure 6. The error probabilities at the AFC as a function of SNR in time-varying channel conditions.
Sensors 19 02452 g006
Figure 7. The error probabilities at the EFC as a function of SNR in time-varying channel conditions.
Figure 7. The error probabilities at the EFC as a function of SNR in time-varying channel conditions.
Sensors 19 02452 g007
Figure 8. The error probabilities at the AFC with an increasing number of sensors in time-varying channel conditions.
Figure 8. The error probabilities at the AFC with an increasing number of sensors in time-varying channel conditions.
Sensors 19 02452 g008
Figure 9. The error probabilities at the EFC with an increasing number of sensors in time-varying channel conditions.
Figure 9. The error probabilities at the EFC with an increasing number of sensors in time-varying channel conditions.
Sensors 19 02452 g009
Figure 10. The distribution of sensor quantification in different states.
Figure 10. The distribution of sensor quantification in different states.
Sensors 19 02452 g010
Figure 11. An example of data mapping with 20 sensors and four candidate states θ1 to θ4.
Figure 11. An example of data mapping with 20 sensors and four candidate states θ1 to θ4.
Sensors 19 02452 g011
Figure 12. The error probabilities as a function of the number of deployed sensors for SNR = −5 dB.
Figure 12. The error probabilities as a function of the number of deployed sensors for SNR = −5 dB.
Sensors 19 02452 g012
Figure 13. The error probabilities as a function of various SNRs for N = 20.
Figure 13. The error probabilities as a function of various SNRs for N = 20.
Sensors 19 02452 g013
Figure 14. The error probabilities as a function of the number of deployed sensors for SNR = −5 dB.
Figure 14. The error probabilities as a function of the number of deployed sensors for SNR = −5 dB.
Sensors 19 02452 g014
Figure 15. The error probabilities as a function of various SNRs for N = 20.
Figure 15. The error probabilities as a function of various SNRs for N = 20.
Sensors 19 02452 g015

Share and Cite

MDPI and ACS Style

Liu, L.; Chen, W.; Li, T.; Liu, Y. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors 2019, 19, 2452. https://doi.org/10.3390/s19112452

AMA Style

Liu L, Chen W, Li T, Liu Y. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors. 2019; 19(11):2452. https://doi.org/10.3390/s19112452

Chicago/Turabian Style

Liu, Liang, Wen Chen, Tao Li, and Yuling Liu. 2019. "Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks" Sensors 19, no. 11: 2452. https://doi.org/10.3390/s19112452

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop