An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
|
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [1] An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks
    Yang, Na
    WIRELESS NETWORKS, 2022, 28 (8) : 3493 - 3502
  • [2] Identity-based online/offline encryption
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 247 - +
  • [3] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [4] Improved Identity-Based Online/Offline Encryption
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 160 - 173
  • [5] Securing wireless sensor networks: an identity-based cryptography approach
    Szczechowiak, Piotr
    Scott, Michael
    Collier, Martin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (3-4) : 182 - 192
  • [6] An efficient multi-PKG online/offline identity-based encryption scheme for wireless sensor network
    Ning, Jianting
    Yin, Xinchun
    Xu, Yebin
    Sensors and Transducers, 2013, 157 (10): : 121 - 128
  • [7] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
  • [8] Efficient online/offline identity-based signature for wireless sensor network
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    Yang, Yanjiang
    Wong, Jun Wen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 287 - 296
  • [9] Efficient online/offline identity-based signature for wireless sensor network
    Joseph K. Liu
    Joonsang Baek
    Jianying Zhou
    Yanjiang Yang
    Jun Wen Wong
    International Journal of Information Security, 2010, 9 : 287 - 296