scholarly journals A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network

2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Chunpeng Ge ◽  
Jinyue Xia ◽  
Aaron Wu ◽  
Hongwei Li ◽  
Yao Wang

Wireless sensor network (WSN), which extends the typical Internet environment to Internet of Things, has been deployed in various environments such as safety monitoring, intelligent transportation, and smart home. In a WSN, encryption is typically used to protect data that are stored in wireless devices. However some features like data sharing can be affected if the traditional encryption is used. A secure mechanism should support a gateway of the network to directly convert a user’s encrypted data (encrypted pollution data) to a new user’s encryption without exposing the underlying plaintext data during the whole sharing phase. In this work, a new source hiding identity-based proxy reencryption scheme (SHIB-PRE) is proposed to deal with the issue. The proposed SHIB-PRE scheme supports a proxy (gateway or cloud server) to transform a user’s encrypted date to a new user’s ciphertext as long as the proxy has the proxy reencryption key. In SHIB-PRE, the encrypted pollution data is kept secure from the proxy and the relationship between a source ciphertext and a reencrypted ciphertext is concealed from the outside eavesdropper. In this paper, we give an introduction to the definition of a source hiding identity-based proxy reencryption and its chosen plaintext security model. Further, a concrete construction will be presented and proven chosen plaintext secure under the q-DDHE assumption in the standard model.

2020 ◽  
Vol 309 ◽  
pp. 02006
Author(s):  
Jianbo Yao ◽  
Chaoqiong Yang

It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key cryptography is proposed. The security architecture is based on identity based cryptosystem, but not requires key handshaking. The analysis shows that the security architecture ensures a good level of security and is very much suitable for the resources constrained trend of wireless sensor network.


2019 ◽  
Vol 13 (1/2) ◽  
pp. 178
Author(s):  
Rudra Pratap Ojha ◽  
Goutam Sanyal ◽  
Pramod Kumar Srivastava

2013 ◽  
Vol 427-429 ◽  
pp. 2630-2635
Author(s):  
Le Jun Zhang ◽  
Xin Deng ◽  
Lin Guo ◽  
Jian Pei Zhang ◽  
Hong Bo Li

This paper presents the data fusion survivability analysis model of wireless sensor network (WSN) based on stochastic Petri net (SPN). First, the definition of data fusion survivability is put forward, and the data fusion model of WSN is constructed. Second, the SPN modeling method of security events, which influences the WSN, is described. Lastly, simulation experiment proves the correctness and effectiveness of the modeling of WSN data fusion survivability analysis based on SPN. This model can provide the theoretical basis and guide for designing a survivable WSN.


Author(s):  
Rakesh Saini ◽  
Naveen Kumar

: Safe direction-finding is extremely necessary for multihop wireless systems such as Wireless Sensor Networks. Multihop wireless systems are more defenseless to safety outbreaks as associated to single stage wireless networks. Cross layer design production a precise significant character for wireless sensor network submissions. Advanced security is actual significant for the achievement of announcement among sensor nodes in wireless sensor network because the numbers composed is regularly slight and the network is mostly susceptible. Numerous Security methods have been suggested to deliver safety resolutions beside numerous extortions to the Cross-layer modification techniques in Wireless sensor network. In this paper we overview the existing schemes for the security of cross-layer design in wireless sensor network. Proposed Security model will provide more security between sensor nodes and base station in wireless sensor network. Security is important for the success of the wireless sensor network because the data collected are often sensitive and the network is particularly vulnerable. In the cross-layer design, constraints are substituted between changed layers to protection well-organized use of energy. In this paper, we propose a secure security model that is based on cross layer design. It uses a cross layer optimization Mechanism. Reproduction consequences confirmation that our proposed safety model can achieve better in many situations and in unfriendly violence-disposed to situation.


Author(s):  
Pooja Singh

There are a lot of prospects of the vehicular network, including the artificial neural networks incorporating a wireless sensor network. Its number comes after the mobile communication network and the internet. The network is characterized by more through measure and sense and exhibits more comfortable operability and intelligence. A wireless sensor network can be simply defined as “a network of wireless devices using sensors to monitors and recording the physical conditions of the environment and organizing the collected data at a central location.” WSNs measure environmental conditions like temperature, sound, pollution levels, humidity, wind speed and direction, pressure, etc. Thus, wireless sensor networks are widely used for fulfilling the essential needs of environmental sensing applications. These applications show the broad ranges in precision agriculture, monitoring of the vehicle, and video surveillance.


2019 ◽  
Vol 13 (1/2) ◽  
pp. 178 ◽  
Author(s):  
Rudra Pratap Ojha ◽  
Pramod Kumar Srivastava ◽  
Goutam Sanyal

2014 ◽  
Vol 1070-1072 ◽  
pp. 2033-2036
Author(s):  
Ya Qin Fan ◽  
Jing Ya Wang ◽  
Shu Ting Liu

The paper studies the basic characteristics and the definition of the wireless sensor networks, the time synchronization of wireless sensor network and the algorithm of time synchronization in wireless sensor networks. This paper studies the RBS algorithm and its improved algorithm. The research results have practical significance to the rapid development of network and the future network.


Sign in / Sign up

Export Citation Format

Share Document