An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [31] A Survey on Encryption Schemes in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2014 7TH INTERNATIONAL CONFERENCE ON ADVANCED SOFTWARE ENGINEERING AND ITS APPLICATIONS (ASEA), 2014, : 39 - 43
  • [32] IBKES: Efficient Identity-Based Key Exchange with Scalability for Wireless Sensor Networks Using Algebraic Signature
    Wan, Changsheng
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 39 (1-4) : 215 - 237
  • [33] Novel Reversible Design of Advanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks
    Saravanan, P.
    Kalpana, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1427 - 1458
  • [34] An ID-based online/offline signature scheme without random oracles for wireless sensor networks
    Wang, Zhiwei
    Chen, Wei
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 837 - 841
  • [35] Novel Reversible Design of Advanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks
    P. Saravanan
    P. Kalpana
    Wireless Personal Communications, 2018, 100 : 1427 - 1458
  • [36] On use of identity-based encryption for secure emailing
    Veigner, Christian
    Rong, Chunming
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 289 - +
  • [37] Securing Internet of Drones With Identity-Based Proxy Signcryption
    Khan, Muhammad Asghar
    Shah, Habib
    Rehman, Sajjad Ur
    Kumar, Neeraj
    Ghazali, Rozaida
    Shehzad, Danish
    Ullah, Insaf
    IEEE ACCESS, 2021, 9 : 89133 - 89142
  • [38] Modulation and data encryption technology of RSSI algorithm for wireless sensor networks
    Wang, Wei
    Wang, Zhaoba
    Journal of Information and Computational Science, 2015, 12 (07): : 2901 - 2909
  • [39] An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature
    Baek, Joonsang
    Byon, Young-ji
    Hableel, Eman
    Al-Qutayri, Mahmoud
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 358 - 363
  • [40] Online/Offline Attribute-Based Encryption
    Hohenberger, Susan
    Waters, Brent
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 293 - 310