SEARCH WITHIN CONTENT
Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 5, Issue 4, Pages 799-810, DOI: https://doi.org/10.21307/ijssis-2017-507
License : (CC BY-NC-ND 4.0)
Received Date : 03-August-2012 / Accepted: 03-September-2012 / Published Online: 01-December-2012
Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide variety of malicious attacks. As various applications of WSN have been proposed, security has become one of the big research challenges dan is receiving increasing attention. In order to insure the security of communication in wireless sensor networks, we proposed a new ID-based signcryption scheme using bilinear pairing. Under the computational Diffie-Hellman assumption, the security of the scheme is proved under the Random Oracle Model. This scheme can be used by the sensor nodes that with low power, less storage space and low computation ability. It is concluded that the proposed lightweight scheme satisfies the security requirements of WSN.
 F. Amin, A. H. Jahangir, H. Rasi fard, “Analysis of Public-Key Cryptography for Wireless
Sensor Networks Security,” World Academy of Science, Engineering and Technology, 2008.
 J. Deng, R. Han, Shivakant Mishra, “Enhancing Base Station Security in Wireless Sensor
Netowrks,” University of Colorado, Department of Computer Science. Technical Report CU-US-
 P. Wide, “Human-based Sensing - Sensor Systems to Complement Human Perception”,
International Journal on Smart Sensing and Intelligent Systems, vol.1, No.1, pp.57-69, 2008.
 Y. Zheng, “Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost
(Signature) + Cost (Encryption),” Advances in Cryptology-CRYPTO’07, LNCS 4294, Springer,
 A. Shamir, “Identity-based cryptosystems and signature schemes,” Advances in Cryptology-
CRYPTO’ 84, LNCS 196, Springer, 1984, pp.47-53.
 J. Malone-Lee, “Identity based signcryption,” Cryptology ePrint Archive. Report 2012/098,
2002, Available from: http://eprint.iacr.org/2012/098.
 J. K. Liu, J. Baek, J. Zhou, Y. Yang, J. Wong, “Efficient Online/Offline Identity-Based
Signature for Wireless Sensor Network,” Cryptology ePrint Archive. Report 2010/03, 2010,
Available from: http://eprint.iacr.org/2010/03.
 W. Heinzelman, A. Chandrakasan, H. Balakrishnan, “An application-specific protocol
architecture for wireless microsensor networks,” IEEE Transactions on Wireless
Communications, pp. 660–670, 2012.
 A. Boukerch, L. Xu, K. El-Khatib, “Trust-based security for wireless ad hoc and sensor
networks,” Computer Communication 30(11–12), pp. 2413–2427, 2007.
 K. Kifayat, M. Merabti, Q. Shi, D. Lewellyn-Jones, “An efficient algorithm to detect
faulty reading in wireless sensor network using the concept of reputation,” International
Conference on Network and Service Security, pp. 1–5, 2009.
 P. Kamat, A. Baliga, W. Trappe, “An identity-based security framework for VANETs,”
VANET’06, Los Angeles, California, pp.94-95, 2006.
 H. Yussof, J. Wada and M. Ohka, “Analysis of Tactile Slippage Control Algorithm for
Robotic Han Performing Grasp-Move-Twist Motions”, International Journal on Smart Sensing
and Intelligent Systems, vol. 3, No. 3, 2010, pp. 359-375.
 S. D. Galbraith, “Supersingular curves in cryptography,” Advances in Cryptology-
ASIACRYPT 2011, LNCS 4248, Springer, pp. 419-513, 2011.
 D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing,” Advances in
Cryptology - ASIACRYPT 2011, LNCS 4448, Springer, pp. 514-532, 2011.
 A. Joux, “The Weil and Tate pairings as building blocks for public key cryptosystems,”
Algorithm Number Theory, LNCS 2369, Springer, pp. 20-32, 2002.