An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

被引:0
作者
Na Yang
机构
[1] Shangqiu Institute of Technology,Department of Information and Electronic Engineering
来源
Wireless Networks | 2022年 / 28卷
关键词
Wireless sensor networks; Identity-based encryption (IBE); Identity-based encryption online; Offline (IBOOE); Algorithm improvement; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
引用
收藏
页码:3493 / 3502
页数:9
相关论文
共 50 条
  • [41] Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
    Hazra, Prasun
    Giri, Debasis
    Das, Ashok Kumar
    MATHEMATICS AND COMPUTING, 2015, 139 : 135 - 154
  • [42] A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network
    Ge, Chunpeng
    Xia, Jinyue
    Wu, Aaron
    Li, Hongwei
    Wang, Yao
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [43] Identity based authentication protocol for wireless sensor networks
    Salinas Rosales, Moises
    Duchen Sanchez, Gonzalo
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (52): : 196 - 205
  • [44] IRIBE: Intrusion-resilient identity-based encryption
    Yu, Jia
    Hao, Rong
    Zhao, Huawei
    Shu, Minglei
    Fan, Jianxi
    INFORMATION SCIENCES, 2016, 329 : 90 - 104
  • [45] Towards Compact Identity-Based Encryption on Ideal Lattices
    Jia, Huiwen
    Hu, Yupu
    Tang, Chunming
    Wang, Lin
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 354 - 378
  • [46] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [47] Making Any Identity-Based Encryption Accountable, Efficiently
    Kiayias, Aggelos
    Tang, Qiang
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 326 - 346
  • [48] Securing Topology Control in SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Liu, Xin
    Chen, Jianfei
    Ma, Lei
    Wang, Yong
    Zhang, Hao
    Yu, Hao
    Su, Bing
    Zhang, Fangzhe
    Sun, Lili
    JOURNAL OF SENSORS, 2023, 2023
  • [49] Improving User Privacy in Identity-Based Encryption Environments
    Adams, Carlisle
    CRYPTOGRAPHY, 2022, 6 (04)
  • [50] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407