RETRACTED: IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security (Retracted Article)

被引:112
作者
Cao, ChunHua [1 ,2 ]
Tang, YaNa [1 ]
Huang, DeYan [1 ]
Gan, WeiMin [1 ]
Zhang, Chunjiong [3 ]
机构
[1] Software Engn Inst Guangzhou, Guangzhou 510990, Peoples R China
[2] Univ Perpetual Help Syst, Manila 0900, Philippines
[3] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
关键词
ROUTING PROTOCOL; EFFICIENT; OPTIMIZATION;
D O I
10.1155/2021/8527068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when applied to WSN. To this end, according to WSN's characteristics and based on the identity-based encryption idea, an improved identity-based encryption algorithm (IIBE) is proposed, which can effectively simplify the key generation process, reduce the network traffic, and improve the network security. The design idea of this algorithm lies between the traditional public key encryption and identity-based public tweezers' encryption. Compared with the traditional public key encryption, the algorithm does not need a public key certificate and avoids the management of the certificate. Compared with identity-based public key encryption, the algorithm addresses the key escrow and key revocation problems. The results of the actual network distribution experiments demonstrate that IIBE has low energy consumption and high security, which are suitable for application in WSN with high requirements on security.
引用
收藏
页数:8
相关论文
共 33 条
[1]   An Energy Efficient Schedule for IEEE 802.15.4/ZigBee Cluster Tree WSN with Multiple Collision Domains and Period Crossing Constraint [J].
Ahmad, Aasem ;
Hanzalek, Zdenek .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (01) :12-23
[2]   BEST-MAC: Bitmap-Assisted Efficient and Scalable TDMA-Based WSN MAC Protocol for Smart Cities [J].
Alvi, Ahmad Naseem ;
Bouk, Safdar Hussain ;
Ahmed, Syed Hassan ;
Yaqub, Muhammad Azfar ;
Sarkar, Mahasweta ;
Song, Houbing .
IEEE ACCESS, 2016, 4 :312-322
[3]   WSN application for crop protection to divert animal intrusions in the agricultural land [J].
Bapat, Varsha ;
Kale, Prasad ;
Shinde, Vijaykumar ;
Deshpande, Neha ;
Shaligram, Arvind .
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2017, 133 :88-96
[4]   Soft-WSN: Software-Defined WSN Management System for IoT Applications [J].
Bera, Samaresh ;
Misra, Sudip ;
Roy, Sanku Kumar ;
Obaidat, Mohammad S. .
IEEE SYSTEMS JOURNAL, 2018, 12 (03) :2074-2081
[5]   Spatio-Temporal Optimization of Perishable Goods' Shelf Life by a Pro-Active WSN-Based Architecture [J].
De Venuto, Daniela ;
Mezzina, Giovanni .
SENSORS, 2018, 18 (07)
[6]  
El Rachkidy Nancy, 2013, Journal of Communications, V8, P151, DOI 10.12720/jcm.8.3.151-160
[7]   A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption [J].
Elhoseny, Mohamed ;
Elminir, Hamdy ;
Riad, Alaa ;
Yuan, Xiaohui .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) :262-275
[8]   An Energy Efficient Receiver-Initiated MAC Protocol for Low-Power WSN [J].
Fernandes, Renato F., Jr. ;
de Almeida, Marcelo B. ;
Brandao, Dennis .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) :1517-1536
[9]   RWiN: New Methodology for the Development of Reconfigurable WSN [J].
Grichi, Hanen ;
Mosbahi, Olfa ;
Khalgui, Mohamed ;
Li, Zhiwu .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2017, 14 (01) :109-125
[10]   Integrated Networking, Caching, and Computing for Connected Vehicles: A Deep Reinforcement Learning Approach [J].
He, Ying ;
Zhao, Nan ;
Yin, Hongxi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (01) :44-55