Next Article in Journal
Computation of Gait Parameters in Post Stroke and Parkinson’s Disease: A Comparative Study Using RGB-D Sensors and Optoelectronic Systems
Next Article in Special Issue
Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy
Previous Article in Journal
Real-Time Hyperspectral Video Acquisition with Coded Slits
Previous Article in Special Issue
Mapping Urban Air Quality from Mobile Sensors Using Spatio-Temporal Geostatistics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping

School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(3), 823; https://doi.org/10.3390/s22030823
Submission received: 1 December 2021 / Revised: 17 January 2022 / Accepted: 18 January 2022 / Published: 21 January 2022
(This article belongs to the Special Issue Sensors and Sensor Fusion for Future Mobility Systems)

Abstract

:
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because of the network’s open properties and constrained resources. Therefore, it is important to ensure data confidentiality in WSN with highly efficient security mechanisms. We proposed a lightweight security transmission method based on information hiding and random data flipping to ensure that the ally fusion center (AFC) can achieve confidential data transmission over insecure open links. First, the sensors’ local measurements are coded into a customized binary string, and then before data transmission, some parts of the string are flipped by the sensors according to the outputs of a pre-deployed pseudo-random function. The AFC can recover the flipped binaries using the same function and extract the measurement hidden in the string, while the enemy fusion center (EFC) cannot distinguish flipped and non-flipped data at all, and they cannot restore the measurement correctly as long as one bit in the string is not correctly recovered. We proved the security and anti-interference of the scheme through both simulations and physical experiments. Furthermore, the proposed method is more efficient such that it consumes less power than traditional digital encryptions through real power consumption tests.

1. Introduction

As we all know, wireless sensor networks (WSNs) are currently widely employed in various fields, especially in military reconnaissance [1], drone monitoring [2], industrial control [3], transportation [4], etc., to collect various physical or environmental data. Sometimes, WSN is deployed in places that humans cannot reach or in enemy areas. Distributed detection is a common decision-making method in WSN, which means that multiple sensors are deployed in a target area to measure the physical state of a target in a decentralized manner. Each sensor makes a local decision based on its observations, and then it sends the decision to the Ally Fusion Center (AFC) through a wireless channel. The AFC utilizes all the received sensor data to make the final decision with regard to the target. However, as the sensor data are transmitted in a broadcast method, the Enemy Fusion Center (EFC) in the network can easily eavesdrop on the data, which is a serious threat to the confidentiality of the data transmissions in WSN. In addition, WSN is usually battery-powered to maintain its work. Therefore, the traditional encryption methods, which rely on complex calculations, are unsuitable for WSN. To extend the duration of sensor nodes and ensure the confidentiality of the data transmission, it is important to find a lightweight and safe data transmission scheme for WSN.
Faced with the above challenges, several lightweight encryption schemes have been proposed by researchers. Khashan et al. [5] proposed an automated and lightweight encryption scheme using a dynamic clustering technique which supports mobility in WSN, and it dynamically controls the complexity of the encryption process based on the currently limited resources. Cao et al. [6] proposed an improved identity-based encryption algorithm that lies between the traditional public-key encryption and identity-based public tweezers’ encryption, effectively simplifying the key generation process. In [7], the scheme first forwards all traffic packets in a disordered manner, using different network paths and protocols, and then distributes the traffic packets from one stream to another based on different encryption schemes. Usually, these schemes that rely on traditional encryptions to secure data confidentiality still face the computational burden of encryption and decryption.
On the other hand, several novel lightweight efficient schemes have been proposed. A physical layer-based security framework was proposed by Bashar et al. [8]. Assuming that the transmission channel of WSN is exposed to generalized K-fading, the framework uses cumulative distribution, optimal sensor, and round-robin scheduling schemes to reduce the probability of being eavesdropped. In [9], the authors designed a secure transmission scheme based on artificial noise. The transmitter designs the noise precoding matrix based on the known channel state information of the legitimate channel. The receiver can calculate the transmitted data from the probability distribution of channel state information, but the eavesdropper cannot. In [10], Jeon et al. proposed to explore the randomness of the wireless channel gains to encrypt the sensors’ local measurements with random flipping of the measured data. However, the scheme is only suitable for ideal situations, such that the instantaneous channel gains of sensors to the AFC all conform to the expected Rayleigh distribution, which is difficult to achieve in the real time-varying physical channels. In [11], Zhang et al. improved Jeon’s work. They optimized the flipping thresholds and let some sensors stay inactive to save transmission energy according to the sensors’ local detection confidence levels. In [12], Chen et al. designed an immune-based differential evolution algorithm to find the optimal rollover rate to minimize the fusion error of AFC while maintaining the fusion error of EFC at a high level. In [13], Yaacoub et al. proposed a clustering algorithm for grouping sensor nodes into cooperative clusters, and the sensor sends data to the parent node with minimal energy consumption and randomly flips bits based on channel state information to reduce the energy consumption and transmission time of the sensor data. In [14], the security transmission scheme is extended to a scenario with multiple quantization scales and candidate states. Currently, most of the schemes are designed based on the instantaneous channel state conformed to an expected ideal distribution. If the statistic of the channel state changes from time to time, it is very difficult to meet the required conditions, which seriously restricts the applications of these security models.
In this paper, we propose a secure data transmission scheme based on information hiding and simple data flipping. The basic idea is to first hide the local measurements into a customized binary string based on the principle of encoding hiding [15]. Then, the sensors and the AFC generate a random number sequence synchronously based on the output of a pre-deployed pseudo-random function, which determines the data flipping. Finally, the flipped binary strings along with error correction codes are sent to the AFC, which can recover the flipped strings and then extract the sensor observations from the strings. Our scheme has a simpler calculation process than traditional encryption and decryption algorithms, and it is more suitable for resource-constrained WSN.
The contributions of this paper can be summarized as follows:
(1) The proposed scheme has the anti-interference ability, and it can resist the change of channel environment and malicious attacks of EFC.
(2) The scheme is based on information hiding, which increases the data confidentiality, such that as long as one bit of the binary string is not correctly recovered, the EFC fails to withdraw the true measurements coded in the string.
(3) The energy consumption is lower than that of the traditional encryption method. Traditional encryption algorithms are relayed on complex key distribution, S-box confusion, and multiple rounds of iterative calculations. On the contrary, our scheme only needs simple data flipping, which is much more efficient.
(4) Groups of comparisons are carried to test the confidentiality and efficiency of our method in both simulations and real environments.
The rest of this article is organized as follows. Section 2 gives the system model. Section 3 gives a safety analysis. The computational complexity is discussed in Section 4. Section 5 is simulation experiments and physical experiments. Section 6 is the power consumption test. Conclusions are drawn in Section 7.

2. The Description of the Security Model

2.1. System Model

N sensor nodes are deployed in a target area to monitor a common physical state ( θ 0 / θ 1 )   in a distributed manner. The measurement of each sensor s i is quantized into binaries (local decision u i ) based on the measurement and a decision threshold. If the measurement is less than the threshold, then u i = 0 , otherwise u i = 1 . Let p ( u i = 1 | θ 1 ) and p ( u i = 1 | θ 0 ) denote the local detection rate p d i and false alarm rate p f i of the i -th sensor, respectively. Usually, p d i and p f i can be known in advance both by the AFC and EFC.
The framework of the system discussed in this paper is shown in Figure 1. The N sensors are divided into g groups and each group comprises k sensors. The k decision bits from the corresponding k sensors are converted into one decimal number, x . Then, x is embedded in a customized binary string a as hidden information through the F5 algorithm [16]. After that, a is flipped according to the n -bit output sequence φ = φ 1   φ 1   φ n of a pseudo-random function r a n d ( · ) and threshold λ . a i is assigned to the flipping group if   φ i is in the flipping domain, otherwise, it is assigned to the non-flipping group. Generally, the output sequence of r a n d ( · ) is decided by its initial s e e d . The flipped result X j of each group is sent to AFC along with its error correction code (ECC). In this paper, forward error correction (FEC) is employed to ensure that AFC can correct limited errors in the received data X. Finally, AFC recovers the flipped binary string, then extracts the embedded information x from the string, and obtains the real state of the target state by data fusion. The main process of the proposed method is shown in Figure 2.

2.2. Information Hiding and Recovery

Before data transmission, the measurements of each sensor are hidden into a binary string, which is called carrier in traditional digital steganography [16]. The steps for embedding the message are as follows:
Step 1 k sensors simultaneously observe the common target state and generate k binary observations U = u 1 u 2 u k and U is converted to a decimal number x .
Step 2 Randomly generate an n -bits binary carrier a = a 1 a 2 a n .
Step 3 Construct a hash function f ( · ) using successive XOR ‘ ’ operations on a i     i , i = 1 , 2 n , which is shown in Equation (1).
f ( a ) =   i = 1 n a i i
Step 4 Calculate the position s of the binary bit to be flipped in a , 0     s     n , as shown in Equation (2).
s = x f ( a )
where x is the secret to be hidden in a.
Step 5 Modify a according to s , as shown in Equation (3).
a = { a , i f   s = 0 a 1 a 2 a ¯ s a n , i f   s 0
where a ¯ s = 1 a s denotes the inversion of the s -th bit in a .
Suppose the carrier embedding before and after is a and a , respectively, and the Hamming distance between a and a is employed to represent the change caused by the modification of the carrier, which is shown in Equation (4).
d ( a , a ) = i = 1 n | a i a i | d m a x
The triple ( d m a x , n , k ) denoted that there are n modifiable positions in a = a 1 a 2 a n   to embed k -bit secret messages. Usually, F5 [16] requires that at most one bit of a is modified to get a’, such that d m a x = 1 . When we withdraw the encoded secret x from a’, the hash function f ( a ) is calculated, and x = f ( a ) .
Equation (5) is a derivation to prove that the hash function satisfies f ( a ) = x .
f ( a ) = [ i = 1 , i s n a i i ] [ a ¯ s s ] = [ i = 1 , i s n a i i ] [ ( 1 a s ) ( x f ( a ) ) ] = [ i = 1 , i s n a i i ] [ 1 ( x f ( a ) ) a s ( x f ( a ) ) ] = [ i = 1 , i s n a i i ] [ ( x f ( a ) ) a s ( x f ( a ) ) ] = [ i = 1 , i s n a i i ] ( x f ( a ) ) a s s = [ i = 1 , i s n a i i ] a s s ( x f ( a ) ) = i = 1 n a i i x f ( a ) = f ( a ) x f ( a ) = x
Usually, n and k satisfy n = 2 k 1 . It is well known that a k -bit binary string has 2 k different permutations and can represent 2 k different numbers from 0 to 2 k 1 . Since the F5 algorithm requires the carrier to be modified by no more than 1 bit, the unmodified state of the carrier represents 0. Therefore, the carrier can represent the remaining 2 k 1 numbers when its length is 2 k 1 .
Accordingly, the carrier modification density D ( k ) and the embedding rate R ( k ) can be calculated in Equations (6) and (7). R ( k ) represents how much information is hidden in a unit carrier. The lower the R ( k ) , the lower the carrier utilization and the higher the security. With the same embedding capacity, a low embedding rate will use more carriers than a high embedding rate, and therefore the computational effort and power consumption of the sensor will increase.
D ( k ) = 1 n + 1 = 1 2 k
R ( k ) = k n = 1 n ln ( n + 1 ) = k 2 k 1
According to D ( k ) and R ( k ) , the embedding efficiency W ( k ) can be defined in Equation (8). W ( K ) indicates how many bits can be embedded for each change of a i , which is approximately equal to k . With the same embedding capacity, the higher the W ( k ) , the less the modification to the carrier will be, but the computational load will increase instead. Moreover, whenever one bit of the carrier intercepted by the adversary is incorrect, a completely different k-bit data will be recovered. Therefore, the security decreases as W ( k ) increases.
W ( k ) = R ( k ) D ( k ) = 2 k k 2 k 1
Table 1 shows that the carrier data embedding rate R ( k ) decreases with the increase of embedding efficiency W ( k ) . Therefore, to realize a balance between embedding rate and embedding efficiency, it is better to choose a shorter ciphertext length k .

2.3. Flipping Encryption

In the previous section, the outputs of k sensors were embedded in the n -bit string a . A pseudo-random function r a n d ( . ) is previously deployed at both the sensor nodes and AFC. The output of the function determines which bits of a will be flipped. If the i -th output φ i of r a n d ( . ) falls within the flipping interval, then a i is flipped, otherwise, it is not flipped. As r a n d ( . ) is a pseudo-random function, if the AFC and the sensor have the same initial s e e d , the same random sequence can be generated synchronously at both sides. The s e e d can be determined by channel state information or received signal strength indicator (RSSI). Due to the channel independence, the EFC can only know the channel state from itself to the sensors, but nothing about the channel state from the AFC to the sensors because of the physical independence. Before the data transmission at each duplex time, the AFC first sends pilot signals { τ 1 , τ 2 , τ 3 } to the sensor, where { τ 1 > τ 2 > τ 3 } . The sensor sends a local decision to the AFC after receiving the pilot channel. In this way, the AFC and the sensor initialize the same seed with RSSI. The sensor generates a new φ each time it receives the pilot signal, and the AFC generates the same φ after receiving the sensor signal. The pseudo-random function generates the results in the way shown in Equation (9). t refers to the t -th transmission of sensor data in a duplex time. The first φ is generated with RSSI as the s e e d , after which the previous φ is used as the s e e d to generate φ .
φ i ( t ) = { r a n d ( s e e d i ) ,                   i f     t = 1 r a n d ( φ i ( t 1 ) ) ,               i f     t > 1
The encrypted data of a are denoted by X , where X = X 1 X n . If τ 2 < φ i < τ 1 , X i will be put into the non-flipping group, that is, X i = a i . If τ 3 < φ i < τ 2 , X i will be put into the flipping group, that is, X i = a i , that is X i = 1 a i .
φ is manually set to obey a uniform distribution. For instance, we use the r a n d ( ) function in MATLAB to generate random numbers that are uniformly distributed in the interval (0,1) in the simulation. Its probability density function is f ( x ) = 1 τ 1 τ 3 , therefore, its cumulative distribution function is shown in Equation (10).
F ( x ) = τ 3 τ 2 f ( x ) d x = τ 3 τ 2 1 τ 1 τ 3 d x
We use λ to denote the probability that a i is flipped. If the flipping probability is λ , then the probability of not flipping is 1 λ . The definition of λ is shown in Equation (11).
λ = τ 2 τ 3 τ 1 τ 3
Then, we encode X with the BCH error correction code (ECC) and send X | E C C to the AFC. In the proposed scheme, the AFC might not recover a correctly if there is channel noise. As long as one bit is wrong, completely incorrect sensor data will be recovered. Error correction codes can increase the robustness and improve the probability of correct data recovery. BCH code is a classical and effective forward error correction code that corrects limited errors immediately as the data are received. For example, the (7,4,3) BCH code used in the experiment, which encodes 4 bits of data into 7 bits, can correct 1 bit of error.
Due to the broadcast nature of WSN, the EFC can eavesdrop on messages that AFC can receive. However, it cannot distinguish between flipped data and unflipped data, let alone extract the original sensor outputs embedded in it. Therefore, the EFC is completely unable to use the information it eavesdrops on.

2.4. The Fusion Result of the AFC

In this section, the fusion result of the AFC based on the log-likelihood ratio (LLR) is analyzed. Assume that the output vectors of N sensors received by AFC are z = [ z 1 A z N A ] , and according to [17] the LLR-based fusion rule at the AFC is given by Equation (12):
Λ = l o g P ( z A | θ 1 ) P ( z A | θ 0 ) = i = 1 N l o g f ( z i A | θ 1 ) f ( z i A | θ 0 )
The main purpose of multi-sensor fusion decision is to obtain detection performance that is not achievable by any single sensor by fusing the detection results of multiple sensors. The fusion results are compared with the decision threshold, which affects the accuracy of the fused sensor data. How to find the optimal threshold is a problem that many researchers are exploring, but it is not the focus of this paper. Therefore, in the experiments of this paper, the decision threshold is set to 0. If Λ is greater than the decision threshold, the fusion decision result is θ 1 , otherwise, it is θ 0 . f ( · | · ) is the conditional probability density function of the sensor. The sensors’ measurements are assumed to be independent and identically distributed (i.i.d.) under θ 0 / θ 1 .
In Section 2.2 and Section 2.3, N sensors have been divided into g groups. The k sensor outputs of each group have been evenly embedded in the binary string a = [ a 1 a n ] , which are then flipped and encrypted into the binary string X = X 1 X n . After receiving the data, the AFC first corrects errors in the transmission by FEC and then recovers a via Equation (13).
a i A = {     X i A ,                   i f       τ 2 < φ i = r a n d ( φ i t 1 ) < τ 1 1 X i A ,             i f       τ 3 < φ i = r a n d ( φ i t 1 ) < τ 2    
AFC can easily recover a i A and calculate f ( a A ) = x A . x A can be converted to the binary string z 1 A z k A . In the same way, we can recover the sensor output of each group and get the output vector of N sensors z A = z 1 A z N A . Let U 1 = { i | z i A = 1 } and U 2 = { i | z i A = 0 } , then the fusion rule can be rewritten as Equation (14):
Λ = i U 1 l o g f ( z A | θ 1 ) f ( z A | θ 0 ) + i U 2 l o g f ( z A | θ 1 ) f ( z A | θ 0 )
where
i U 1 l o g f ( z A | θ 1 ) f ( z A | θ 0 ) = i U 1 l o g f ( u i A = 1 | θ 1 ) f ( u i A = 1 | θ 0 ) = i U 1 l o g p d i p f i
i U 2 l o g f ( z A | θ 1 ) f ( z A | θ 0 ) = i U 1 l o g f ( u i A = 0 | θ 1 ) f ( u i A = 0 | θ 0 ) = i U 1 l o g 1 p d i 1 p f i
Therefore, the final fusion rule is shown in Equation (17).
Λ = i U 1 l o g p d i p f i + i U 1 l o g 1 p d i 1 p f i
If Λ is greater than the decision threshold, the fusion decision result is θ 1 , otherwise, it is θ 0 . Note that this approximation can be regarded as a modified version of the Chair–Varshney fusion rule, which utilizes only the local detection rate and false alarm rate.

3. Security Analysis

In this section, we analyze the security of the scheme by discussing whether the EFC can obtain useful information from the eavesdropped data. The data eavesdropped by EFC from the sensor nodes are X E = X 1 E X n E . Since the EFC does not know the channel status of the AFC and the common seed of the sensor and the AFC, it can only use the RSSI of the eavesdropped data as the seed. It recovers a i E as follows:
a i E = { X i E ,                           i f       τ 2 < φ i E = r a n d ( φ i t 1 E ) < τ 1 1 X i E ,                 i f       τ 3 < φ i E = r a n d ( φ i t 1 E ) < τ 2    
Next, we intend to prove f ( a E ) = x E x . It may be assumed that there are m bits in a E that cannot be recovered correctly and S = { i | a E = 1 a i A } . If f ( a E ) = f ( a A ) , then f ( a E ) f ( a A ) = 0 . Thus
f ( a E ) f ( a A ) = [ i = 1 , i S n a i E i ] [ i S a i E i ] [ i = 1 n a i i ] = [ i = 1 , i S n a i E i ] [ i S a i E i ] [ i = 1 , i S n a i A i ] [ i S a i A i ] = [ i S a i E i ] [ i S a i A i ] = [ i S ( 1 a i A ) i ] [ i S a i A i ] = [ i S 1 i ] [ i S a i A i ] [ i S a i A i ] = [ i S 1 i ] = [ i S i ]
f ( a E ) = [ i S i ] f ( a A ) = [ i S i ] x = x E
It can be inferred that f ( a E ) f ( a A ) 0 , unless [ i S i ] = 0 .
x E can be converted to a binary string z 1 E z k E . Next, we can prove that the probabilities of z i E = z i A and z i E = z i A are equal.
P ( z i E = z i A ) = C m 0 + C m 2 + C m 4 2 m = j = 2 n C m j 2 m
P ( z i E = z i A ) = C m 1 + C m 3 + C m 5 2 m = j = 2 n + 1 C m j 2 m
From a statistical point of view, m = λ · n . Obviously, when m > 1, i.e., λ > 1 / n , there is P ( z i E = z i A ) = P ( z i E = z i A ) = 0.5 .
Similarly, we can recover the sensor output of each group to obtain the output vector of N sensors x E = z 1 E z N E . Then, the fusion rule of EFC can be expressed as:
L = l o g f ( z E | θ 1 ) f ( z E | θ 0 )
If L is greater than the decision threshold, the fusion decision result is θ 1 , otherwise, it is θ 0 . It can be seen from Equation (23) that data confidentiality can be achieved by deriving f ( z E | θ 1 ) equal to f ( z E | θ 0 ) , which makes the LLR value at the EFC always equal to zero. The EFC will ignore the data since it cannot make a final decision for the binary hypothesis testing problem when L = 0 .
f ( z E | θ 1 ) = P ( z A = 1 | θ 1 ) · P ( z i E = z i A ) + P ( z A = 0 | θ 1 ) · P ( z i E = z i A )     = p d · P ( z i E = z i A ) + ( 1 p d ) · P ( z i E = z i A ) = 0.5
Similarly,
f ( z E | θ 0 ) = P ( z A = 0 | θ 0 ) · P ( z i E = z i A ) + P ( z A = 1 | θ 0 ) · P ( z i E = z i A )     = ( 1 p f ) · P ( z i E = z i A ) + p f · P ( z i E = z i A ) = 0.5
Obviously,
L = l o g f ( z E | θ 1 ) f ( z E | θ 0 ) = 0
As can be deduced from Equation (26), the LLR at EFC is always equal to 0, which makes it impossible to decide the target state. Therefore, it is almost impossible for EFC to make correct decisions based on the captured sensor data.

4. Time Complexity Evaluation

In this section, the time complexity of this scheme in a duplex time is analyzed. To compare with traditional encryption algorithms, we define the stage from the sensors observing target state to sending data as the encryption stage, and the stage from the AFC receiving data to taking out the sensor outputs as the decryption stage. Then, we use Big O notation to describe the time complexity of the encryption stage and the decryption stage. The proposed scheme in this paper is referred to as the information hiding and data flipping (IHDF) scheme.
In step 1 of Section 2.2, the time complexity of N sensors to observe the target state is O ( N ) . Since N = g k , O ( N ) O ( g k ) . In step 2, the time complexity of generating a random binary string a of length n is O ( g n ) . In step 3, the time complexity of calculating the hash function f ( a ) is also O ( g n ) . In step 4, the time complexity of calculating the position s of the bits in a to be changed is O ( g ) . In step 5, the time complexity of the operation of modifying a according to s at most one bit is O ( g ) . In Section 2.3, the time complexity of the sensor generating φ that determines whether a ’ is flipped is O ( g n ) . The time complexity of calculating the error correction code of the encrypted X is O ( g n ) .Therefore, the time complexity of the encryption stage of IHDF is O ( g k + 4 g n + 2 g ) O (   N / k · ( k + 4 n + 2 ) ) O ( N / R ( x ) ) .
Similarly, the time complexity of AFC for error correction of the received messages is O ( g n ) . The time complexity of generating the flipping sequence φ is O ( g n ) . The time complexity of calculating a is O ( g n ) . The time complexity of calculating x = f ( a ) is O ( g n ) . The time complexity of restoring x to binary output is O ( g k ) . Therefore, the time complexity of the decryption stage of IHDF is O ( 5 g n + g k ) O ( N / k · ( 5 n + k ) ) O ( N / R ( x ) ) .
The computation load of the sensor nodes is O ( N / R ( x ) ) and the computation load of the AFC is also O ( N / R ( x ) ) . The time complexity decreases as R ( x ) increases.
RC6 [18], Simon [19], and Speck [19] are typical lightweight encryption algorithms, while Rijndael [20] and Twofish [21] are traditional symmetric encryption algorithms. Table 2 shows the computational complexity of each algorithm. Compared with Rijndael and Twofish, the proposed scheme has no complicated S-box confusion, and the time and space costs are significantly reduced. For symmetric encryption algorithms, if the information to be encrypted is too short, such as a few bits, it must be filled to at least the shortest encryption length. At the same time, multiple iterative calculations are required, which will increase the computational effort.

5. Experiments

5.1. Simulation Result

In this section, a group of simulations is performed to demonstrate that the AFC can correctly fuse the sensor outputs when there are only two candidate states, while EFC cannot eavesdrop on the real state.
The comparison object is the method in [10] in which the sensor randomly flips its output according to the channel gain, and the AFC calculates the true state through the channel statistics. In addition, the performance of the Optimum-LLR proposed in [22], where the Optimum-LLR-based fusion rule is derived within the absence of the EFC, is considered as the lower bounds of the error probability.
In the simulation experiment, for comparison, we used a similar condition as in [1], deploying the sensors in a star-like topology and assuming that the main channel gain follows the Rayleigh distribution. The total error probability by P ε = δ ( 1 P d ) + ( 1 δ ) P f  is taken as the criterion of fusion performance, where P d  and P f  are the detection and false alarm probabilities at the fusion center. Furthermore, the sensors have the same local detection performances, P d = 0.8  and P f = 0.2 . In addition, δ  is the weighting factor and we set δ = 0.5 . In our scheme, there are five sensors in a group, i.e., k = 5  and n = 31 , and we set the flip probability λ = 0.5 . Otherwise, we use (7,4,3) Bose–Chaudhuri–Hocquenghem (BCH) codes as the error correction code. All parameters are shown in Table 3.
The first round of comparisons is performed under the ideal conditions that the channel gains strictly follow the Rayleigh distribution. The results are shown in Figure 3 and Figure 4, which depict the weighted error probability (WEP) of the AFC and EFC with a different signal-to-noise ratio (SNR) and numbers of sensors. Figure 3 shows the WEP of AFC and EFC as the SNR increases when the number of sensors is 20. It can be seen that under ideal channel conditions, the AFC using IHDF can obtain a lower error probability than Jeon’s method when the SNR is greater than −2, even approaching the lower bound after the SNR is greater than 0. Figure 4 shows the WEP of AFC and EFC as the number of sensors increases when the SNR is −1. It can be seen that in an ideal channel, the AFC error probability of IHDF is very close to the lower bound, which is significantly lower than that of Jeon’s method. As can be seen from Figure 3 and Figure 4, the error probability of EFC is always around 50%. Obviously, under ideal conditions, both IHDF and Jeon can achieve complete confidentiality of information.
To further test the proposed scheme, we designed another group of comparisons that simulates a more realistic network environment in which the channel gain varies continuously and we have no prior knowledge of the probability distribution of the gain.
Figure 5 shows the WEP of AFC and EFC as SNR increases in a time-varying environment when the number of sensors is 20. It can be seen that the AFC using IHDF can obtain an error probability close to the lower bound when the SNR is greater than −2 under time-varying environmental conditions. The error probability of Jeon’s method will exceed 50%. Figure 6 shows the WEP of AFC and EFC as the number of sensors increases when the SNR is −1 under time-varying environmental conditions. IHDF can reduce the error probability as the number of sensors increases, but Jeon’s error probability remains at around 50%. However, EFC still cannot distinguish between flipped and unflipped data with an error probability of about 50%. Obviously, in a time-varying environment, although Jeon’s method can guarantee the confidentiality of information, it has been completely unable to restore the original data. The proposed scheme is more resistant to changes in channel conditions than Jeon’s method and can guarantee complete confidentiality of information while maintaining a lower error probability.

5.2. Physical Experiment Results

In this section, we experiment with the method in a real physical environment. We prepared six CC2530 development boards, two of which are used as AFC and EFC, respectively, and the other four are equipped with five photosensitive sensors each. The current presence or absence of light is regarded as the physical target for common observation. Firstly, the AFC or EFC is connected to our computer through a USB cable, and then the collected data from the sensors by the AFC and EFC along with their fusion results are read out by serial debugging software in real time, respectively. The sensors’ local detection rate and false alarm rate are 0.95 and 0.1, respectively, which are known both by the AFC and EFC. The rest of the parameters remain the same as in Section 5.1. The parameters of the sensor devices are shown in Table 4. The experimental devices and the topology of the physical sensor network in our experiments are shown in Figure 7 and Figure 8, respectively.
The comparison objects are three lightweight symmetric encryption algorithms: RC6, Simon, and Speck. To meet the low power consumption requirements of WSN, the calculation process should be as simple as possible. Therefore, we selected the lowest encryption bits and the shortest key length of these algorithms to encrypt the sensor output directly and decrypt it in the fusion center. After artificially adding a certain percentage of error bits to the data sent from the sensor to the fusion center, we measured the error probabilities of AFC and EFC as the number of sensors increased. Each compared algorithm is running in the sensor network for at least one hour to generate more than 5800 pieces of sensor data.
Figure 9 shows that the WEP of the AFC decreases as the number of sensors increases in the physical WSN environment. The WEP of the IHDF decreases as the number of sensors increases. At a BER of 0.2, the error probability of the IHDF remains in a very low range. At a BER of 0.5, the error probability can be reduced to less than 5% by increasing the number of sensors, which makes the error probability of IHDF significantly lower than that of other algorithms. This is because the error correction mechanism of IHDF enables AFC to actively correct the error of the received codeword when receiving sensor data. Generally, sensors in WSN are battery-powered, but AFC is usually powered by an external power source, so the operation of correcting the incorrect code would not add too much burden to the AFC. Even at a BER of 0.08, the error probability can be reduced to less than 10% by increasing the number of sensors. Compared with other algorithms, the proposed scheme outperforms RC6 and Speck and is only slightly inferior to Simon in the case of high BER. Figure 10 shows that in a physical network, the EFC is unable to distinguish between flipped and unflipped data when eavesdropping on the communication data between the sensor and AFC, with an error probability of about 50%.
As can be seen from Figure 9 and Figure 10, IHDF utilized steganography and random flipping to ensure the data confidentiality, which has higher anti-interference ability and efficiency, while ensuring the confidentiality as the lightweight symmetric encryption algorithm.

6. Power Consumption Evaluation

In this section, we measured the power consumption of the algorithm in Section 5.2 after running on the CC2530 development board for a while.
We put the fully charged 14,500 lithium battery into the CC2530 development board and send the encrypted sensor output at a rate of 5800 times per hour. After the development board continues to run the algorithm for several hours, the remaining battery power is measured. We continue to discharge the battery with a current of 1   A . The discharge ends when the battery voltage drops to the cutoff voltage. The total amount of discharge during this time is the remaining charge of the battery. Similarly, the fully charged battery power can be measured. The hourly power consumption is calculated by dividing the difference between the fully charged battery power and the remaining power by the operating time.
To avoid errors caused by different development boards and batteries, we ran each algorithm once on each of the four development boards, which corresponded to the batteries one by one. To measure the pure power consumption of the algorithm, all sensors were removed from the development board before starting the measurement. The average of the four measurements was then taken as the final hourly power consumption. The measurement order and measurement values for each algorithm are shown in Table 5. It can be seen that the proposed scheme consumes significantly less power compared with the traditional lightweight symmetric encryption algorithm. Combined with Table 2, the proposed scheme has no iterative computation, only 5 bits of data are encrypted, and the carrier bit string used to hide the information is only 31 bits. The amount of running code is much smaller than that of the traditional symbolic measure encryption algorithm. Therefore, the proposed scheme is more suitable than the traditional method for wireless sensor network applications that require low energy consumption.

7. Conclusions

In this paper, a lightweight scheme based on information hiding is proposed for data confidentiality in distributed WSNs. Due to the openness of WSNs, sensor data are transmitted through insecure channels. The EFC can eavesdrop on all transmitted data from sensors and calculate the state of the observed target through data fusion. To prevent the eavesdropping of EFC, we designed a transmission scheme based on information hiding and data flipping. The main idea is to hide the local measurements into a customized binary string based on the principle of encoding hiding. Then, the sensors and the AFC generate a sequence of random numbers synchronously based on the output of a pre-deployed pseudo-random function, which determines the data flipping. Finally, the flipped binary strings are sent to the AFC along with error correction codes. The AFC can recover the flipped string and then extract the sensor’s observations from the string.
Through simulations and experiments in real physical equipment, it is demonstrated that the proposed scheme enables the AFC to correctly recover the sensor output, while the EFC is completely unable to distinguish between flipped and unflipped data. The proposed scheme has good immunity to interference and can still restore the original data more accurately in the changing physical environment. Moreover, the proposed method is more efficient through real power consumption tests and consumes less power than the traditional symmetric encryption.
We believe that the proposed scheme can be deployed in many WSN applications with limited resources and unpredictable operating environments, including natural disaster monitoring and remote control of UAVs, due to its anti-interference, low complexity, and low power characteristics.

Author Contributions

Conceptualization, W.C.; methodology, L.Z.; software, L.Z.; validation, L.Z. and M.K.; formal analysis, L.Z.; investigation, M.K.; resources, W.C.; data curation, M.K.; writing—original draft preparation, L.Z.; writing—review and editing, W.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Program of China (020YFB1805405, 2019QY0800), the Natural Science Foundation of China (U1736212,61872255, U19A2068), and the Key Laboratory of Pattern Recognition and Intelligent Information Processing, Institutions of Higher Education of Sichuan Province (Grant: MSSB-2020-01).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shen, S.; Li, H.; Han, R.; Vasilakos, A.V.; Wang, Y.; Cao, Q. Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  2. Potter, B.; Valentino, G.; Yates, L.; Benzing, T.; Salman, A. Environmental Monitoring Using a Drone-Enabled Wireless Sensor Network. In Proceedings of the 2019 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, 26–29 April 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  3. Lu, T.; Guo, X.; Li, Y.; Peng, Y.; Zhang, X.; Xie, F.; Gao, Y. Cyberphysical security for industrial control systems based on wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10, 438350. [Google Scholar] [CrossRef]
  4. Gaber, T.; Abdelwahab, S.; Elhoseny, M.; Hassanien, A.E. Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Netw. 2018, 146, 151–158. [Google Scholar] [CrossRef]
  5. Khashan, O.A.; Ahmad, R.; Khafajah, N.M. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 2021, 115, 102448. [Google Scholar] [CrossRef]
  6. Cao, C.; Tang, Y.; Huang, D.Y.; Gan, W.; Zhang, C. IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security. Secur. Commun. Netw. 2021, 2021, 8527068. [Google Scholar] [CrossRef]
  7. Liu, G.; Quan, W.; Cheng, N.; Gao, D.; Lu, N.; Zhang, H.; Shen, X. Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet Things J. 2021, 8, 6578–6590. [Google Scholar] [CrossRef]
  8. Bashar, A.; Smys, S. Physical Layer Protection against Sensor Eavesdropper Channels in Wireless Sensor Networks. IRO J. Sustain. Wirel. Syst. 2021, 3, 59–67. [Google Scholar] [CrossRef]
  9. Lin, S.; Han, R.; Yu, G.; Song, C.; Huang, H.; Wang, Y. A Secure Transmission Scheme Based on Artificial Noise in a MISO Eavesdropping System. In Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1134–1138. [Google Scholar]
  10. Jeon, H.; Choi, J.; McLaughlin, S.W.; Ha, J. Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 619–625. [Google Scholar] [CrossRef]
  11. Zhang, G.; Sun, H. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks. Sensors 2016, 16, 2152. [Google Scholar] [CrossRef] [Green Version]
  12. Chen, W.; Zhao, H.; Li, T.; Liu, Y. Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wirel. Netw. 2017, 24, 2497–2507. [Google Scholar] [CrossRef]
  13. Yaacoub, E.; Chehab, A.; Al-Husseini, M.; Abualsaud, K.; Khattab, T.; Guizani, M. Joint Security and Energy Efficiency in IoT Networks through Clustering and Bit Flipping. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1385–1390. [Google Scholar] [CrossRef]
  14. Liu, L.; Chen, W.; Li, T.; Liu, Y. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors 2019, 19, 2452. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Yin, Z.; Xiang, Y.; Zhang, X. Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans. Multimed. 2020, 22, 874–884. [Google Scholar] [CrossRef]
  16. Steganalysis, H.C.D.B.; Westfeld, A. F5—A steganographic algorithm. In Proceedings of the Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, 25–27 April 2001; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2137, p. 289. [Google Scholar] [CrossRef]
  17. Chen, B.; Jiang, R.; Kasetkasem, T.; Varshney, P. Channel Aware Decision Fusion in Wireless Sensor Networks. IEEE Trans. Signal Process. 2004, 52, 3454–3458. [Google Scholar] [CrossRef]
  18. Rivest, R.L.; Robshaw, M.J.B.; Sidney, R.; Yin, Y.L. The RC6 block cipher. In Proceedings of the First Advanced Encryption Standard (AES) Conference, Ventura, CA, USA, 20–22 August 1998. [Google Scholar]
  19. Beaulieu, R.; Shors, D.; Smith, J.; Treatman-Clark, S.; Weeks, B. The SIMON and SPECK lightweight block ciphers. In Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, 8–12 June 2015; pp. 1–6. [Google Scholar]
  20. Daemen, J.; Rijmen, V. The block Cipher Rijndael. In Proceedings of the International Conference on Smart Card Research and Advanced Applications, Louvain-la-Neuve, Belgium, 14–16 September 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 277–284. [Google Scholar]
  21. Schneier, B. The Twofish encryption algorithm. Dr. Dobb’s J. Softw. Tools Prof. Program. 1998, 23, 30–34. [Google Scholar]
  22. Varshney, P.K. Distributed Detection and Data Fusion; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
Figure 1. The framework of a wireless sensor network with an ally fusion center and an eavesdropping fusion center.
Figure 1. The framework of a wireless sensor network with an ally fusion center and an eavesdropping fusion center.
Sensors 22 00823 g001
Figure 2. The main process of the proposed scheme.
Figure 2. The main process of the proposed scheme.
Sensors 22 00823 g002
Figure 3. The weighted error probabilities at the AFC and EFC as a function of SNR in ideal channel conditions.
Figure 3. The weighted error probabilities at the AFC and EFC as a function of SNR in ideal channel conditions.
Sensors 22 00823 g003
Figure 4. The weighted error probabilities at the AFC and EFC with an increasing number of sensors in ideal channel conditions.
Figure 4. The weighted error probabilities at the AFC and EFC with an increasing number of sensors in ideal channel conditions.
Sensors 22 00823 g004
Figure 5. The weighted error probabilities at the AFC and EFC as a function of SNR in time-varying channel conditions.
Figure 5. The weighted error probabilities at the AFC and EFC as a function of SNR in time-varying channel conditions.
Sensors 22 00823 g005
Figure 6. The weighted error probabilities at the AFC and EFC with an increasing number of sensors in time-varying channel conditions.5.2. Physical Experiment Results.
Figure 6. The weighted error probabilities at the AFC and EFC with an increasing number of sensors in time-varying channel conditions.5.2. Physical Experiment Results.
Sensors 22 00823 g006
Figure 7. Sensor devices in the experiment.
Figure 7. Sensor devices in the experiment.
Sensors 22 00823 g007
Figure 8. Experimental topology.
Figure 8. Experimental topology.
Sensors 22 00823 g008
Figure 9. The weighted error probabilities at the AFC with an increasing number of sensors in the physical environment.
Figure 9. The weighted error probabilities at the AFC with an increasing number of sensors in the physical environment.
Sensors 22 00823 g009
Figure 10. The weighted error probabilities at the EFC with an increasing number of sensors in the physical environment.
Figure 10. The weighted error probabilities at the EFC with an increasing number of sensors in the physical environment.
Sensors 22 00823 g010
Table 1. The relationship between ( k , n ) and modification density, embedding rate, and embedding efficiency.
Table 1. The relationship between ( k , n ) and modification density, embedding rate, and embedding efficiency.
kn D ( k ) R ( k ) W ( k )
1150%100%2
2325%66.67%2.67
3712.50%42.86%3.43
4156.25%26.67%4.27
5313.12%16.13%5.16
6631.56%9.52%6.09
71270.78%5.51%7.06
82550.39%3.14%8.03
95110.20%1.76%9.02
Table 2. The computational complexity of different algorithms.
Table 2. The computational complexity of different algorithms.
AlgorithmS-Box ConfusionShortest Encryption
Length (bit)
Shortest Key
Length (bit)
Shortest Iteration
Frequency
IHDFno101
RC6 [18]no12812820
Simon [19]no326432
Speck [19]no326422
Rijndael [20]yes12812810
Twofish [21]yes12812816
Table 3. Parameter setting.
Table 3. Parameter setting.
ParametersValue
Detection rate0.8
False alarm rate0.2
δ 0.5
k 5
n 31
λ 0.5
BCH codes(7,4,3)
Table 4. The parameters of the sensor devices.
Table 4. The parameters of the sensor devices.
ParametersValue
ChipCC2530
InterfaceUSB/UART/SPI
Transmission speed9600 Kbps
Operating frequency band2.4 GHz
Operating Voltage3.7 V
Transmission ProtocolZigbee
Detection rate0.95
False alarm rate0.1
δ 0.5
k 5
n 31
λ 0.5
BCH codes(7,4,3)
Table 5. Hourly power consumption of different algorithms.
Table 5. Hourly power consumption of different algorithms.
AlgorithmHourly Power Consumption (mWh/h)
IHDF55
RC678
Simon32/6461
Speck68
Not encrypted42
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhou, L.; Kang, M.; Chen, W. Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping. Sensors 2022, 22, 823. https://doi.org/10.3390/s22030823

AMA Style

Zhou L, Kang M, Chen W. Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping. Sensors. 2022; 22(3):823. https://doi.org/10.3390/s22030823

Chicago/Turabian Style

Zhou, Lan, Ming Kang, and Wen Chen. 2022. "Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping" Sensors 22, no. 3: 823. https://doi.org/10.3390/s22030823

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop