A Secure Data Getting/Transmitting protocol for WSN in IoT Using Revocable Storage Identity Based Cryptography

被引:0
|
作者
Lavanya, P. [1 ]
Sangeetha, A. [1 ]
Kumar, K. Raj [1 ]
机构
[1] PSNACET, Dept IT, Dindigul, Tamil Nadu, India
关键词
Wireless Sensor Network; Internet of Things; Revocable Storage Identity-Based Cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the important properties and it plays a vital role in all area even in human life. Wireless Sensor Node (WSN) is connected by means of the Internet of Things (IoT). The IoT is very keen towards the area of security research. In our work, we clearly discuss the concept of data transmission in IoT devices or IoT systems. When a data get transmitted from sensor node to client it can be theft by some intruders there exist lack of security. In order to overcome this issue, the security concept of revocable storage identity-based encryption was defined and used here. The wireless sensor nodes were employed here with the internet for data transfer and there exist some security protocol to avoid interrupting. We had proposed a system called revocable storage identity-based encryption technique where it provides a valid secret key to transfer data from sensor node to client for a particular session period. The main advantage of using this concept which will reduce the complexity of the encryption process for both the sensor node and the client. With the help of this technique, the system gets protected and high level of security is enhanced.
引用
收藏
页码:1164 / 1170
页数:7
相关论文
共 50 条
  • [11] Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission
    Anitha S.
    Saravanan S.
    Chandrasekar A.
    Measurement: Sensors, 2023, 29
  • [12] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Brou Bernard Ehui
    Chen CHEN
    Shirui WANG
    Hua GUO
    Jianwei LIU
    ChineseJournalofElectronics, 2024, 33 (01) : 43 - 57
  • [13] A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud
    Ehuil, Brou Bernard
    Chen, Chen
    Wang, Shirui
    Guo, Hua
    Liu, Jianwei
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 43 - 57
  • [14] An Energy Efficient Secure routing Scheme using LEACH protocol in WSN for IoT networks
    Suresh B.
    Shyama Chandra Prasad G.
    Measurement: Sensors, 2023, 30
  • [15] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [16] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [17] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [18] Compressive sensing based secure data aggregation scheme for IoT based WSN applications
    Salim, Ahmed
    Ismail, Ahmed
    Osamy, Walid
    Khedr, Ahmed M.
    PLOS ONE, 2021, 16 (12):
  • [19] Secure multicasting in wireless sensor networks using identity based cryptography
    Sampradeepraj, T.
    Devi, V. Anusuya
    Raja, S. P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01):
  • [20] Energy Efficient Cluster based Routing Protocol with Secure IDS for IoT Assisted Heterogeneous WSN
    Alkhliwi, Sultan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (11) : 495 - 502