4.8 Article

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 10, Pages 9980-9994

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2988733

Keywords

Sensors; Oceans; Internet of Things; Base stations; Security; Analytical models; Data collection; Data collection; security; smart ocean; storage; underwater wireless sensor networks (UWSNs)

Funding

  1. National Key Research and Development Program of China [2019YFB2102600]
  2. Fundamental Research Funds for the Central Universities [2019CDQYRJ006]
  3. National Natural Science Foundation of China [61702062, 61672118, 61932006]
  4. Chongqing Research Program of Basic Research and Frontier Technology [cstc2018jcyjAX0334, cstc2017jcyjB0305]
  5. Key Project of Technology Innovation and Application Development of Chongqing [cstc2019jscx-mbdxX0044]
  6. Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing [cx2018015]
  7. Technical Projects of China Southern Power Grid [GD-KJXM-20180250]
  8. Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University [2019/01/1041]

Ask authors/readers for more resources

Due to the abundant marine resources, smart ocean has attracted much attention of the government, industry, and academy. The Internet-of-Things (IoT) architectures for smart ocean have been proposed to collect various of data from the ocean, thereby assisting environmental protection, military reconnaissance, and so on. However, few researchers have paid attention to the security and privacy issues of data collection and transmission. In this article, for the unreliable underwater environment, we present a secure, efficient, and complete data collection, and transmission and storage scheme for IoT in smart ocean. Especially, to prolong the lifetime of the underwater node, two novel data compression algorithms [lossy data compression algorithm (LCA) and lossless data compression algorithm (NLCA)] are also proposed. Moreover, due to the vulnerability of underwater nodes, we also propose a corresponding IoT framework and data collection pattern to resist the single point failure attack. Besides, to guarantee the confidentiality, reliability, and integrity of transmitting data, Elliptic Curve-ElGamal (EC-ElGamal) and elliptic curve digital signature algorithm (ECDSA) are employed. The consensus algorithm and blacklisting mechanism are also employed to detect and address failure or malicious nodes. Finally, the security analysis demonstrates that our scheme is able to resist many typical attacks for underwater nodes, such as manipulation attacks, Distributed Denial-of-Service (DDoS) attacks, malicious node injection attacks, and so on. Additionally, relevant experimental results show that the scheme is feasibility and efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available