An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [21] Securing wireless sensor networks: Security architectures
    Boyle, David
    Newe, Thomas
    Journal of Networks, 2008, 3 (01) : 65 - 77
  • [22] An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
    Qin, Zhongyuan
    Zhang, Xinshuai
    Feng, Kerong
    Zhang, Qunfang
    Huang, Jie
    SENSORS, 2014, 14 (10) : 17937 - 17951
  • [23] Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks
    Chien, Hung-Yu
    Lee, Chin-I
    Wu, Tzong-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 993 - 998
  • [24] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [25] Identity-based encryption comes of age
    Martin, Luther
    COMPUTER, 2008, 41 (08) : 93 - 95
  • [26] Identity-Based Encryption in the Internet of Things
    Genc, Yasin
    Afacan, Erkan
    29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
  • [27] Backward Compatible Identity-Based Encryption
    Kim, Jongkil
    SENSORS, 2023, 23 (09)
  • [28] IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
    Ramadan, Mohammed
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    Abdalla, Hisham
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01) : 223 - 233
  • [29] Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks
    Zhang, Yudi
    He, Debiao
    Li, Yumei
    Zhang, Mingwu
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5320 - 5328
  • [30] Identity-Based Association Protocols for Wireless Personal Area Networks
    Huang, Xin
    Craig, Paul
    Wang, Qinghua
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1820 - 1827