An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
|
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [21] Efficient identity-based online/offline encryption and signcryption with short ciphertext
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    International Journal of Information Security, 2017, 16 : 299 - 311
  • [22] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [24] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    PROCEEDINGS OF THE 2009 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2009, : 349 - 354
  • [25] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    2009 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP 2009), 2009, : 337 - 342
  • [26] Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption
    Yu, Qihong
    Shen, Jian
    Lai, Jin-Feng
    Ji, Sai
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1287 - 1296
  • [27] An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks
    Kim, In Tae
    Hwang, Seong Oun
    Kim, Seungwoon
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 14 (1-2) : 27 - 39
  • [28] Practical Identity-Based Signature for Wireless Sensor Networks
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) : 637 - 640
  • [29] Online/Offline Identity-Based Signcryption Revisited
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 36 - 51
  • [30] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):