An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
|
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [41] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [42] Identity-based online/offline signcryption for low power devices
    Li, Fagen
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Takagi, Tsuyoshi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 340 - 347
  • [43] Wireless Sensor Networks Based on a New Block Encryption Algorithm
    Wang, Hai-yan
    Design, Manufacturing and Mechatronics, 2014, 551 : 454 - 459
  • [44] ROBUST ENCRYPTION ALGORITHM BASED SHT IN WIRELESS SENSOR NETWORKS
    Uma, G. M. E.
    Sriram, G. B. E.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [45] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [46] Chaos encryption algorithm for wireless sensor networks
    Chen, SA
    Zhong, XX
    Shi, JF
    Shao, XL
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 8, 2005, : 468 - 471
  • [47] Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 111 - 127
  • [48] Identity-based key management scheme with provable security for wireless sensor networks
    Zhou, Nanrun
    Jiang, Qiongxi
    Chen, Xun
    Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081
  • [49] ID-MAC: An Identity-Based MAC Protocol for Wireless Sensor Networks
    Cunha, Felipe D.
    Cunha, Italo
    Wong, Hao Chi
    Loureiro, Antonio A. F.
    Oliveira, Leonardo B.
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [50] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721