Skip navigation

A secure and efficient data sharing and searching scheme in wireless sensor networks

A secure and efficient data sharing and searching scheme in wireless sensor networks

Zhu, Binrui, Susilo, Willy ORCID logoORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)

[thumbnail of Publisher's PDF - Open Access]
Preview
PDF (Publisher's PDF - Open Access)
28658 MA_Secure_and_Efficient_Data_Sharing_and_Searching_Scheme_(OA)_2020.pdf - Published Version
Available under License Creative Commons Attribution.

Download (3MB) | Preview

Abstract

Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data Encryption is a fundamental approach but it limits target data retrieval in massive encrypted data. Public key encryption with keyword search (PEKS) enables a data receiver to retrieve encrypted data containing some specific problem, namely, the keyword guessing attack (KGA). KGA includes off-line KGA and on-line KGA. To date, the existing literature on PEKS cannot simultaneously resist both off-line KGA and on-line KGA performed by an external adversary and an internal adversary. In this work, we propose a secure and efficient data sharing and searching scheme to address the aforementioned problem such that our scheme is secure against both off-line KGA and on-line KGA performed by external and internal adversaries. We would like to stress that our scheme simultaneously achieves document encryption/decryption and keyword search functions. We also prove our scheme achieves keyword security and document security. Furthermore, our scheme is more efficient than previous schemes by eliminating the pairing computation.

Item Type: Article
Additional Information: © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Uncontrolled Keywords: wireless sensor networks, cloud computing, Internet of Things, public key encryption with keyword search, off-line keyword guessing attack, on-line keyword guessing attack
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Engineering & Science
Last Modified: 04 Mar 2022 13:06
URI: http://gala.gre.ac.uk/id/eprint/28658

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics