Securable Identity Based Encryption Technique for Wireless Network

نویسندگان

  • S. SUSHMITHA
  • V. DEVI
چکیده

Affirmative secure and efficient big data amalgamate methods is very attractive in the field of wireless sensor networks research. In real settings, the wireless sensor networks have been broadly applied, such as target tracking and environment remote oversight. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity shelter; give an identitybased entirety signature scheme with a designated verifier for wireless sensor networks. According to the advantage of entirety signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for wireless sensor networks. Furthermore, the security of our identity-based entirety signature scheme is rigidly presented based on the Triple DES assumption in random oracle model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography

With fast growing network, many people utilize the internet to transfer digital image information. The need of the time is to implement an extremely securable, economic and perfect system of image encryption that can be well protected from unauthorized access. Also, the bulk size of the image data produces many problems in their transmission via internet. So, in this paper, a very new and combi...

متن کامل

Authenticated health monitoring scheme for wireless body sensor networks

Security and privacy are the main concern for patients to seek wireless body sensor network monitoring their health. Considering the limitations of power, computation capability and storage resources, it is a big challenge to find out suitable secure scheme for patients when relying on wireless body sensor networks to monitor their healthy information. Many schemes based on asymmetric and symme...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

An Identity-Based Broadcast Encryption Scheme for Mobile Ad Hoc Networks

A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themsel...

متن کامل

Survey on Key Management Schemes for Constraint Environment of WSN

Wireless Sensor Networks (WSN) is becoming the heart of many applications. Data integrity and security is a major issue as the wireless sensor nodes are exposed to harsh and hostile environment. This paper highlights the merits and demerits of different key management schemes under the broader classification of Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and Certificateless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016