An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [1] An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks
    Yang, Na
    WIRELESS NETWORKS, 2022, 28 (8) : 3493 - 3502
  • [2] Securing wireless sensor networks: an identity-based cryptography approach
    Szczechowiak, Piotr
    Scott, Michael
    Collier, Martin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (3-4) : 182 - 192
  • [3] Efficient online/offline identity-based signature for wireless sensor network
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    Yang, Yanjiang
    Wong, Jun Wen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 287 - 296
  • [5] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [6] Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
    Zhang, Xiujie
    Fu, Xingbing
    Hong, Lu
    Liu, Yu
    Wang, Liangliang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06):
  • [7] Practical Identity-Based Signature for Wireless Sensor Networks
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) : 637 - 640
  • [8] IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Elhassouny, Azeddine
    Aljaedi, Amer
    Alharbi, Adel R.
    Jamal, Sajjad Shaukat
    IEEE ACCESS, 2021, 9 : 131336 - 131347
  • [9] Online/Offline Identity-Based Signcryption Revisited
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 36 - 51
  • [10] Identity-based online/offline signcryption for low power devices
    Li, Fagen
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Takagi, Tsuyoshi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 340 - 347