A Secure Data Getting/Transmitting protocol for WSN in IoT Using Revocable Storage Identity Based Cryptography

被引:0
|
作者
Lavanya, P. [1 ]
Sangeetha, A. [1 ]
Kumar, K. Raj [1 ]
机构
[1] PSNACET, Dept IT, Dindigul, Tamil Nadu, India
关键词
Wireless Sensor Network; Internet of Things; Revocable Storage Identity-Based Cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the important properties and it plays a vital role in all area even in human life. Wireless Sensor Node (WSN) is connected by means of the Internet of Things (IoT). The IoT is very keen towards the area of security research. In our work, we clearly discuss the concept of data transmission in IoT devices or IoT systems. When a data get transmitted from sensor node to client it can be theft by some intruders there exist lack of security. In order to overcome this issue, the security concept of revocable storage identity-based encryption was defined and used here. The wireless sensor nodes were employed here with the internet for data transfer and there exist some security protocol to avoid interrupting. We had proposed a system called revocable storage identity-based encryption technique where it provides a valid secret key to transfer data from sensor node to client for a particular session period. The main advantage of using this concept which will reduce the complexity of the encryption process for both the sensor node and the client. With the help of this technique, the system gets protected and high level of security is enhanced.
引用
收藏
页码:1164 / 1170
页数:7
相关论文
共 50 条
  • [1] Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1136 - 1148
  • [2] Identity Based Cryptography for Secure AODV Routing Protocol
    Sagheer, Ali M.
    Taher, Hadeel M.
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 198 - 201
  • [3] Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption"
    Lee, Kwangsu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1299 - 1300
  • [4] A Secure Publish/Subscribe Protocol for Internet of Things Using Identity-Based Cryptography
    Peng, Wei
    Liu, Song
    Peng, Kunlun
    Wang, Jin
    Liang, Jin
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 628 - 634
  • [5] Secure Data Transmission Protocol based on Quantum Cryptography
    Hong, Joonmo
    Kang, BooJoong
    Kim, Hye Seon
    Chang, Peter
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4989 - 5002
  • [6] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [7] PKI-Based Cryptography for Secure Cloud Data Storage Using ECC
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Young Sil
    Lee, Hoon Jae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 194 - 199
  • [8] Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
    Pathare, Kedar G.
    Chouragade, P. M.
    2017 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRICAL, ELECTRONICS AND COMPUTING TECHNOLOGIES (ICRTEECT), 2017, : 173 - 176
  • [9] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [10] Cryptography-based secure data storage and sharing using HEVC and public clouds
    Usman, Muhammad
    Jan, Mian Ahmad
    He, Xiangjian
    INFORMATION SCIENCES, 2017, 387 : 90 - 102