Securing Topology Control in SDWSNs Using Identity-Based Cryptography

نویسندگان

چکیده

In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its capability generating public key from node identity directly, compared with traditional cryptography. particular, identity-based combined encryption and signature (IBCES) could encrypt sign messages using same identity. As such, secure confidentiality, integrity, authentication information, we put forward mechanism based on IBCES. First, use authenticated agreement scheme implement neighbor nodes hop-to-hop verification via discovery processes. Then through admission establishment process, end-to-end are established between nodes, sinks, Controller. Finally, collection management processes supporting flat hierarchical structures designed guarantee information. Theoretical analysis shows that our methods satisfy needs resist several attacks. experimental results indicate mechanisms suitable SDWSNs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Mobile Phone Calls with Identity-Based Cryptography

In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key d...

متن کامل

Securing Mobile Data using Cryptography

Shikhar Bhagoliwal Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] Jyotirmoy Karjee Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] ---------------------------------------------------------------------ABSTRACT-------------------------------...

متن کامل

GSM Security Using Identity-based Cryptography

Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM support...

متن کامل

Electronic Voting Protocol Using Identity-Based Cryptography

Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. ...

متن کامل

Identity-Based Cryptography

We review briefly about identity-based encryption and decryption. In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption. The original motivation for identity-based encryption was to help the deployment of a public-key infrastructure. The idea of an identity-based encryption scheme is that the public key can be any arbitrary string, fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensors

سال: 2023

ISSN: ['1687-725X', '1687-7268']

DOI: https://doi.org/10.1155/2023/6187353