Securing Topology Control in SDWSNs Using Identity-Based Cryptography
نویسندگان
چکیده
In software-defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, open channels of SDWSNs make it possible for an attacker eavesdrop, replay, or modify messages, thus posing great threat operations. The security SDWSN has not received enough attention yet. Identity-based cryptography (IBC) may be fitter due its capability generating public key from node identity directly, compared with traditional cryptography. particular, identity-based combined encryption and signature (IBCES) could encrypt sign messages using same identity. As such, secure confidentiality, integrity, authentication information, we put forward mechanism based on IBCES. First, use authenticated agreement scheme implement neighbor nodes hop-to-hop verification via discovery processes. Then through admission establishment process, end-to-end are established between nodes, sinks, Controller. Finally, collection management processes supporting flat hierarchical structures designed guarantee information. Theoretical analysis shows that our methods satisfy needs resist several attacks. experimental results indicate mechanisms suitable SDWSNs.
منابع مشابه
Securing Mobile Phone Calls with Identity-Based Cryptography
In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key d...
متن کاملSecuring Mobile Data using Cryptography
Shikhar Bhagoliwal Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] Jyotirmoy Karjee Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur, India Email: [email protected] ---------------------------------------------------------------------ABSTRACT-------------------------------...
متن کاملGSM Security Using Identity-based Cryptography
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM support...
متن کاملElectronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. ...
متن کاملIdentity-Based Cryptography
We review briefly about identity-based encryption and decryption. In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption. The original motivation for identity-based encryption was to help the deployment of a public-key infrastructure. The idea of an identity-based encryption scheme is that the public key can be any arbitrary string, fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensors
سال: 2023
ISSN: ['1687-725X', '1687-7268']
DOI: https://doi.org/10.1155/2023/6187353