A Survey on Encryption Schemes in Wireless Sensor Networks

Author(s):  
Haythem Hayouni ◽  
Mohamed Hamdi ◽  
Tai-Hoon Kim
Author(s):  
Aravind Karrothu ◽  
Jasmine Norman

Fog networking supports the internet of things (IoT) concept, in which most of the devices used by humans on a daily basis will be connected to each other. Security issues in fog architecture are still a major research area as the number of security threats increases every day. Identity-based encryption (IBE) has a wide range of new cryptographic schemes and protocols that are particularly found to be suitable for lightweight architecture such as IoT and wireless sensor networks. This chapter focuses on these schemes and protocols in the background of wireless sensor networks. Also, this chapter analyses identity-based encryption schemes and the various attacks they are prone to.


2020 ◽  
Vol 16 (6) ◽  
pp. 155014772092873
Author(s):  
Xiujie Zhang ◽  
Xingbing Fu ◽  
Lu Hong ◽  
Yu Liu ◽  
Liangliang Wang

As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works can be executed offline. However, a challenging issue is the well-known identity-based online/offline encryption schemes unable to resist continual key leakage attacks of the secret keys. To address the above security challenge, we put forth the first continual leakage-resilient identity-based online/offline encryption scheme which is suitable for ensuring secure communications in wireless sensor networks. More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. Above all, compared to the existing identity-based online/offline encryption schemes, an identity-based online/offline encryption scheme with continual leakage resilient meets wireless sensor networks with strong security.


Author(s):  
Marcos A. Simplicio ◽  
Bruno T. de Oliveira ◽  
Paulo S. L. M. Barreto ◽  
Cintia B. Margi ◽  
Tereza C. M. B. Carvalho ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document