A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

被引:1
|
作者
Yuan, Chi [1 ]
Chen, Wenping [1 ]
Li, Deying [1 ]
机构
[1] Renmin Univ, Sch Informat, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Identity-Based Encryption; Signcryption; Vandermonde Matrix; Wireless Sensor Network;
D O I
10.1007/978-981-10-8123-1_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sensors in UWSN are vulnerable to malicious attack due to the transmission nature of wireless media under the water. Secure message delivery with low energy consumption is one of major aims in UWSN. In this paper, a Hierarchical Identity-based Signcryption (HIS) scheme is proposed for UWSN. Signcryption mechanism, which completes the signature and encryption in a single logical step, is adopted in the HIS scheme to decrease the communication and computation cost. The private keys of nodes are generated based on the node's identity to decrease the communication cost. Two-layer architecture, cluster head layer and intra-cluster layer, is employed in the HIS scheme. Taking the difference on capacity between the cluster heads and ordinary nodes into account, we perform encrypting operations with different computation complexity in the two layers. The simulation results show that the HIS scheme outperforms ECC-CA, GLKM and AVM algorithm on energy consumption and time cost.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 50 条
  • [21] Efficient identity-based signcryption scheme for multiple receivers
    Yu, Yong
    Yang, Bo
    Huang, Xinyi
    Zhang, Mingwu
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 13 - +
  • [22] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [23] A Fuzzy Identity-Based Signcryption Scheme from Lattices
    Lu, Xiuhua
    Wen, Qiaoyan
    Li, Wenmin
    Wang, Licheng
    Zhang, Hua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4203 - 4225
  • [24] Identity-based Group-recevier Signcryption scheme
    Zhang, Bo
    Shan, Shan
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1986 - +
  • [25] A Novel Identity-based Security Scheme for Wireless Sensor Networks
    Qin, Zhongyuan
    Feng, Kerong
    Hu, Shuaiqi
    Tao, Lei
    Hu, Zunli
    Zhang, Xinshuai
    Huang, Jie
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 662 - 666
  • [26] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234
  • [27] Revocable identity-based signcryption scheme without random oracles
    Zhang, Xiangsong
    Liu, Zhenhua
    Hu, Yupu
    Takagi, Tsuyoshi
    [J]. International Journal of Network Security, 2015, 17 (02) : 110 - 122
  • [28] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    [J]. 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [29] Further improvement of an identity-based signcryption scheme in the standard model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    Takagi, Tsuyoshi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 413 - 421
  • [30] Identity-based multi-receiver threshold signcryption scheme
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (11) : 1331 - 1337