• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2020, Volume: 13, Issue: 21, Pages: 2080-2093

Original Article

A secure IoT based flood warning system using elliptical curve cryptography

Received Date:31 March 2020, Accepted Date:31 May 2020, Published Date:22 June 2020

Abstract

Objectives: To propose a design of an early flood warning system based on IOT with a strong emphasis on the security requirements of such systems. Methods/Analysis: The design of an early flood warning system is based on measuring the hydrological parameters of a river, which include water level and discharge through an IOT based network. To calculate the discharge of water in a river, Manning's equation has been employed. Security protocols based on elliptical curve cryptography has been proposed for authenticating the real-time hydrological data. The proposed security protocols have been formally validated and verified against various active and passive attacks using AVISPA and Scyther. Simulation of the proposed scheme has also been carried out on the TOSSIM simulator using the TinyECC library to estimate the radio and CPU energy overheads. Findings: The formal security validation of the proposed authentication scheme indicates that the scheme is SAFE against various active and passive attacks. The simulation on Scyther indicates that no attacks have been found in proposed authentication protocols. The AVISPA validation also declares the scheme as SAFE as all-important security goals have been achieved. The Energy analyses on TOSSIM indicate that each node in the scheme requires 133 mJ for radio transmission and 59 mJ for CPU operations about the Mica2 Energy Model. Novelty/Improvement: Researchers have proposed many designs and schemes for early flood warnings without giving much emphasis to the security of such systems. The paper focuses on the security requirements of such systems.

Keywords: IoT; flood warning; authentication; ECC; AVISPA; Scyther; TinyOS; TinyECC; TOSSIM

References

  1. Hattabguesmi. Wireless Smart Sensor Networks for Real-Time Warning System of Flash Floods and Torrents. KSA International Journal of Computer Applications (CECNet). 2017. doi: 10.5120/ijca2017913240
  2. Moon AH, Iqbal U, Bhat GM. Secured Data Acquisition System for Smart Water Applications using WSN. Indian journal of Science and Technology. 2016. doi: 10.17485/ijst/2016/v9i10/86694
  3. Gura N, Patel A, Wander A, Eberle H, Shantz SC. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye M, Quisquater J., eds. Cryptographic Hardware and Embedded Systems - CHES 2004 . (Vol. 3156, pp. 119-132) Berlin, Heidelberg. Springer. 2004.
  4. Cremers C. Computer Aided Verification The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta A, Malik S., eds. Lecture Notes in Computer Science. (Vol. 5123) Berlin, Germany. Springer. 2008.
  5. Seal V, Raha A, Maity S, Mitra S, Mukherjee A, Kantinaskar M. A simple flood forecasting scheme using wireless sensor networks”. International Journal of Adhoc, Sensor & Ubiquitous Computing (IJASUC). 2012;3(1).
  6. Marin-Perez R, García-Pintado J, Gómez AS. A Real-Time Measurement System for Long-Life Flood Monitoring and Warning Applications. Sensors. 2012;12(4):4213–4236. Available from: https://dx.doi.org/10.3390/s120404213
  7. Keoduangsine S, Goodwin R. A GPRS-Based Data Collection and Transmission for Flood Warning System: The Case of the Lower Mekong River Basin. International Journal of Innovation, Management and Technology. 2012;3(3).
  8. Hassoun SAA. Developing an empirical formulae to estimate rainfall intensity in Riyadh region. Journal of King Saud University - Engineering Sciences. 2011;23(2):81–88. Available from: https://dx.doi.org/10.1016/j.jksues.2011.03.003
  9. Dawood MS, Suganya J, Devi RK, Athisha G. A Review on Wireless Sensor Network Protocol for Disaster Management. International Journal of Computer Applications Technology and Research. 2013;2(2):141–146. Available from: https://dx.doi.org/10.7753/ijcatr0202.1011
  10. Sunkpho J, Ootamakorn C. Real-time flood monitoring and warning system. Songklanakarin J. Sci. Technol. 2011;33(2):227–235.
  11. Krzhizhanovskaya VV, Shirshov GS, Melnikova NB, Belleman RG, Rusadi FI, Broekhuijsen BJ, et al. Flood early warning system: design, implementation and computational modules. Procedia Computer Science. 2011;4:106–115. Available from: https://dx.doi.org/10.1016/j.procs.2011.04.012
  12. Tejaswitha1 V, Jagadeeshbabu M. Monitoring of Water Level Variations in Rivers and Flood Alert System Using Wireless Sensor Networks. International Research Journal of Engineering and Technology (IRJET). 2016;03(07). Available from: https://doi.org/10.17148/IJARCCE.2015.4885
  13. Lo SW, JHW, Lin FP, Hsu CH. Visual Sensing for Urban Flood Monitoring Sensors. 2015;15(8):20006–20029. Available from: https://doi.org/10.3390/s150820006
  14. Elkhrachy I. Flash Flood Hazard Mapping Using Satellite Images and GIS Tools: A case study of Najran City, Kingdom of Saudi Arabia (KSA) The Egyptian Journal of Remote Sensing and Space Science. 2015;18:261–278. Available from: https://dx.doi.org/10.1016/j.ejrs.2015.06.007
  15. Levis P, Gay D, Tinyosprogramming. Tiny OS Programming. Cambridge University Press. 2009.
  16. Memsic. Xserve User Manual. 2007.
  17. Hankerson D, Vanstone S, Menezes A. Guide to Elliptic Curve Cryptography. New York. Springer. 2004.
  18. El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors. 2019;19(5):1141. doi: 10.3390/s19051141
  19. Dolev D, Yao A. On the security of public key protocols. IEEE Transactions on Information Theory. 1983;29(2):198–208. Available from: https://dx.doi.org/10.1109/tit.1983.1056650

Copyright

© 2020 Khan, Oberoi. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.