Skip navigation
Skip navigation

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream

Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun

Description

The near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with...[Show more]

dc.contributor.authorPuthal, Deepak
dc.contributor.authorNepal, Surya
dc.contributor.authorRanjan, Rajiv
dc.contributor.authorChen, Jinjun
dc.coverage.spatialMiami, Florida, USA
dc.date.accessioned2016-06-14T23:21:05Z
dc.date.createdNovember 1-3, 2015
dc.identifier.isbn9783319261867
dc.identifier.urihttp://hdl.handle.net/1885/103707
dc.description.abstractThe near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with high volume, high velocity data in real-time. Furthermore, they are inefficient as they introduce a significant buffering delay during security verification, resulting in a requirement of large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key Length Based Security Framework (DLSeF) based on the shared key derived from synchronized prime numbers; the key is dynamically updated in short intervals to thwart Man in the Middle and other Network attacks. Theoretical analyses and experimental results of DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time without compromising the security.
dc.publisherSpringer International Publishing AG
dc.relation.ispartofseries16th International Conference Web information Systems Engineering - WISE 2015
dc.sourceLecture Notes in Computer Science 9419
dc.titleA Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream
dc.typeConference paper
local.description.notesImported from ARIES
local.description.refereedYes
dc.date.issued2015
local.identifier.absfor080499 - Data Format not elsewhere classified
local.identifier.ariespublicationu4056230xPUB569
local.type.statusPublished Version
local.contributor.affiliationPuthal, Deepak, University of Technology Sydney
local.contributor.affiliationNepal, Surya, CSIRO
local.contributor.affiliationRanjan, Rajiv, College of Engineering and Computer Science, ANU
local.contributor.affiliationChen, Jinjun, University of Technology
local.description.embargo2037-12-31
local.bibliographicCitation.startpage93
local.bibliographicCitation.lastpage108
local.identifier.doi10.1007/978-3-319-26187-4_7
local.identifier.absseo970108 - Expanding Knowledge in the Information and Computing Sciences
dc.date.updated2016-06-14T08:58:40Z
local.identifier.scopusID2-s2.0-84949794097
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Puthal_A_Dynamic_Key_Length_Based_2015.pdf1.1 MBAdobe PDF    Request a copy
02_Puthal_A_Dynamic_Key_Length_Based_2015.pdf45.99 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  19 May 2020/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator