SWOT : Secure Wireless Object Tracking with Key Renewal Mechanism for Indoor Wireless Sensor Network

Rafina Destiarti A (1), Prima Kristalina (2), Amang Sudarsono (3)
(1) Politeknik Elektronika Negeri Surabaya (PENS) Surabaya, Indonesia
(2) Politeknik Elektronika Negeri Surabaya (PENS) Surabaya, Indonesia
(3) Politeknik Elektronika Negeri Surabaya (PENS) Surabaya, Indonesia
Fulltext View | Download
How to cite (IJASEIT) :
Destiarti A, Rafina, et al. “SWOT : Secure Wireless Object Tracking With Key Renewal Mechanism for Indoor Wireless Sensor Network”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 2, Mar. 2018, pp. 520-31, doi:10.18517/ijaseit.8.2.5268.
Tracking system is one of concerning issue in wireless sensor network (WSN) application. The accuracy of the location estimation from nodes is important parameter in tracking system. However, many various attacks try to manipulate the estimated location or try to provide false nodes data transmission. The secure and privacy data sharing of the estimation is also become another priority in WSN. Hence, this paper focuses on employing secure wireless object tracking (SWOT) system which is added by the reliable method in privacy data sharing. By proposing the transmission system based cryptographic mechanism, some parameter data that are required in estimated calculation such as RSSI, coordinates, pathloss exponent (PLE), and estimated distance will be hidden using encryption process. Due to the limited computational device, we propose security scheme without raising computational capability. Layered encryption using AES 128, RSA 2048, MD5 and SHA-1 provide high performance authentication and data encryption services for each nodes. Implementing mobile cooperative tracking scenario refers to previous work, the proposed security scheme is efficient in terms of processing time which could not influenced to the estimated location accuracy. Moreover, the authentication protocol which is adopted from one time password scenario can apply the key renewal mechanism for AES 128 and MD5 algorithm. The experimental results show that SWOT system achieves 75.95 ms processing time using Raspberry Pi devices including trilateration algorithm and security process. Meanwhile, PC server consumes around 82.7 ms for decrypting, calculating and showing the estimated position by modified iterated extended Kalman filter (IEKF) algorithm.

Long Cheng, et. all, “A Survey Localization in Wireless Sensor Network”, Hindawi Publishing Corporation International Journal of Distibuted Sensor Netwok, vol. 2012, 12 pages, 16 November 2012.

Peng Li, et. all, “Research on Secure Localization Model Bsed on Trust Valuation in Wireless Sensor Networks”, Hindawi Publishing Coorporation, Security and Communication Networks, vol. 2017, 12 pages, 8 March 2017.

Alessandro G., and Stefano Q., “Moving Object Detection in Heterogeneous Conditions in Embedded Systems”, Sensors 2017, vol.17, Issue 7, 1 July 2017

Jingsha He, et. All, “ Reputation-Based Secure Sensor Localization in Wireless Sensor Networks”, Hindawi Publishing Corporation, The Scientific World Journal, Vol. 2014, 10 pages, 20 May 2014.

Rafina D., Prima K., Amang S. “Cluster-Based PLE Areas for Mobile Cooperative Localization in Indoor Wireless Sensor Network”, International Conference on Information Technology and Electrical Engineering (ICITEE), pp: 112-117, October 2016, IEEE.

Rafina D., Prima K., Amang S., “Modified Iterated Extended Kalman Filter for Mobile Cooperative Tracking System”, International Journal on Advanced Science Engineering Information Technology, vol.7, no. 3, pp. 980-992, 2017.

Rafiullah Khan, Sarmad Ullah Khan Shahid Khan, and M. Usman Ali Khan, “Localization Performance Evaluation of Extended Kalman Filter in Wireless Sensors Network”, ANT international conference Procedia computer science, pp:117-124, 2014.

Shrikant P. D., Archana R. R., “Analysis of Location Monitoring Techniques with Privacy Preservation in WSN”, 4th International Conference on Communication Systems and Network Technology, pp: 649-653, 29 May 2014, IEEE.

Abhishek Das, Laxmipriya M., “Bypassing Using Directional Tranceivers: A Design for Anti-Tracking Source Location Privacy Protection in WSNs”, International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pp: 39-44, 16 January 2016, IEEE

Gulshan K., Mritunjay K.R., Hye-Jin Kim, and Rahul S., “A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks”, Hindawi Publishing Coorporation, Mobile Information Systems, vol.2017, 12 pages, 26 February 2017.

Gonzalo S., Cristian G. G., and B. Cristina P. G., “Midgar: Study of Communications Security Among Smart Objects using Platform of Heteregeneous Devices for the Internet of Things”, Future Generation Computer Systems, vol. 74, issue 2017, pp: 444-466, Elsevier.

Yiqin Lu, Jing Zhai, R. Zhu, and Jiancheng Qin, “Study of Wireless Authentication Center With Mied Encryption in WSN”, Hindawi Publishing Corporation, Journal of Sensors, vol. 2016, 7 pages, 29 May 2016.

Singoee S. S., “Raspberry Pi Based Security System”, University of Nairobi, Department of Electrical and Information Engineering, 17 May 2016.

Rafina D., Prima K., Amang S. “Secure Data Transmission Scheme for Indoor Cooperative Localization System”, International Electronics Symposium (IES), September 2017, IEEE.

Saewoom Lee, and Kiseon Kim, “Key renewal mechanism with Sensor Authentication under Clustered Wireless Sensor Networks”, Electronics letters, vol. 51, No. 4, pp: 368-369, 19 February 2015, IEEE

R. J. Kavitha, B. Elizabeth C., “ Secured and Realiable Data Transmission on Multi-hop Wireless Sensor Network”, Springer science+Business Media, LLC 2017, 25 September 2017

M. Thangavel, P. Varalakshmi, S.Sridar, “ An Analysis of Privacy Preservation Schemes in Cloud Computing”, International Conference on Engineering and Technology (ICETECH), pp: 146-151, March 2016, IEEE

Lei Wang and Qing Wang, “Secure-Network-Coding-Bsed File Sharing Via Device-to-Device Communication”, Hindawi Publishing Coorporation, Journal of Electrical and Computer Engineering, vol. 2017, 7 pages, 8 June 2017.

Eddy P. N., Rizky R. J. P., and Iman M. R., “SMS Authentication Code Generated by Advanced Encryption Standard (AES) 256 bits Modification Algorithm and One Time Password (OTP) to Activate New Applicant Account”, ICSITECH, 2016, IEEE.

Salem Aljareh, and Anastasios Kavoukis, “Efficient Time Synchronized One-Time Password Scheme To Provide Secure Wake-Up Authentication on Wireless Sensor Netwoks”, International Journal of Advanced Smart Sensor Network Sytems (IJASSN), vol.3, No.1, January 2013.

Mostafa Abedi, M. Hassan Y., Farshad P., “ Fast Location Prediction Algorithm Utilized in Enchancing One Time Password Authentication”, IEEE Student Conference on Research and Development, 2012.

Zhang Yu, “The Scheme of Public Key Infrastucture for Improving Wireless Sensor Network Security”, International Conference on Computer Science and Automation, pp: 527-530, 2012, IEEE.

Amang S., Toru N., “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, Journal of Information Processing, vol.25, pp:234-243, February 2017.

Gaochang Z., Xiaolin Y., Bin Z., Wei W., “RSA-Based Digital Image Encryption Algorithm In Wireless Sensor Network”, ICSPS, pp: 640-643, 2010, IEEE.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).