A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

被引:1
|
作者
Yuan, Chi [1 ]
Chen, Wenping [1 ]
Li, Deying [1 ]
机构
[1] Renmin Univ, Sch Informat, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Identity-Based Encryption; Signcryption; Vandermonde Matrix; Wireless Sensor Network;
D O I
10.1007/978-981-10-8123-1_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sensors in UWSN are vulnerable to malicious attack due to the transmission nature of wireless media under the water. Secure message delivery with low energy consumption is one of major aims in UWSN. In this paper, a Hierarchical Identity-based Signcryption (HIS) scheme is proposed for UWSN. Signcryption mechanism, which completes the signature and encryption in a single logical step, is adopted in the HIS scheme to decrease the communication and computation cost. The private keys of nodes are generated based on the node's identity to decrease the communication cost. Two-layer architecture, cluster head layer and intra-cluster layer, is employed in the HIS scheme. Taking the difference on capacity between the cluster heads and ordinary nodes into account, we perform encrypting operations with different computation complexity in the two layers. The simulation results show that the HIS scheme outperforms ECC-CA, GLKM and AVM algorithm on energy consumption and time cost.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 50 条
  • [1] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [2] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [3] Generalized Hierarchical Identity-Based Signcryption
    Wang, Hao
    Xu, Qiuliang
    Zhao, Xiufeng
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (07) : 1078 - 1085
  • [4] A biometric identity-based signcryption scheme
    Li, Fagen
    Khan, Muhammad Khurram
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 306 - 310
  • [5] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [6] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    [J]. Journal of Software, 2012, 7 (02) : 366 - 373
  • [7] A new identity-based ring signcryption scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Li, Siwei
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 333 - 342
  • [8] An improved identity-based KCDSA signcryption scheme
    Li, Fagen
    Xu, Chunxiang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 230 - +
  • [10] An Improved Identity-Based Ring Signcryption Scheme
    Deng, Lunzhi
    Liu, Chenglian
    Wang, Xiangbin
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 46 - 54