Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

被引:4
|
作者
Sogani, Ayush [1 ]
Jain, Aman [2 ]
机构
[1] IIS Univ, Jaipur, Rajasthan, India
[2] Maharishi Arvind Inst Sci & Management Ambabari, Jaipur, Rajasthan, India
关键词
Wireless sensor network; Fast authentication; Energy efficient key management; Elliptic curve cryptography (ECC) and Identity based encryption; DESIGN; DEPLOYMENT;
D O I
10.1007/s10586-017-1151-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks described as an emerging new technology with a very promising future. Advances made in wireless sensor networks (WSNs) are the merging of advanced electronic and wireless technologies. Due to the popularity gained by the wireless environment, Security is the main concern. Node authentication without compromising lifespan of the networks is practically a daunting task. This research work introduces a new model, IBE-ECC that administers the energy of sensor nodes with faster authentication process. Signature verification model is deployed to achieve faster authentication process. Nevertheless, the public key-based strategies eliminate the security process but their verification process takes larger time. Therefore, authentication speed is a major constraint of our research endeavor. The proposed scheme is design to achieve high security and fast authentication with energy efficiency. It uses identity-based encryption on elliptic curve cryptography and a user authentication with an energy efficient key management. Further, to improve the speed of the authentication, it reduces the signature size so that itwould accelerate signature verification faster. Hence, the proposed scheme will provide a secure key management, energy efficiency, fast authentication and additionally, computation overhead and communication costs are minimized. Finally, the experimental result demonstrates that the proposed strategy obtains 4797ms higher execution efficiency and 45. 53% lower computation costs than existing schemes.
引用
收藏
页码:10637 / 10648
页数:12
相关论文
共 50 条
  • [1] Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks
    Ayush Sogani
    Aman Jain
    [J]. Cluster Computing, 2019, 22 : 10637 - 10648
  • [2] An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks
    Chang, Guanghui
    Liang, Shaofei
    Xu, Guangxia
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1287 - 1294
  • [3] A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
    Wen-Bin Hsieh
    Jenq-Shiou Leu
    [J]. Wireless Personal Communications, 2014, 77 : 979 - 989
  • [4] A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 979 - 989
  • [5] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [6] A Dynamic Identity User Authentication Scheme in Wireless Sensor Networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1132 - 1137
  • [7] Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures
    Suganthi, S. D.
    Anitha, R.
    Thanalakshmi, P.
    [J]. DIGITAL CONNECTIVITY - SOCIAL IMPACT, 2016, 679 : 155 - 168
  • [8] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [9] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    [J]. AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [10] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389