scholarly journals An Identity based Multi-receiver Generalized Signcryption Scheme

2018 ◽  
Vol 6 (4) ◽  
Author(s):  
Tej Singh ◽  
Rashid Ali

Generalized signcryption can adaptively work as a signcryption scheme, a signature scheme or an encryption scheme jointly with only one algorithm. It is very suitable for the storage constrained environments, like smart card, the embedded system and wireless sensor networks. In this paper, we proposed an identity based multi –receiver generalized signcryption. We also prove the security of the proposed scheme in the simplified modal under the q-DHIP and q-BDHIP.

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772092873
Author(s):  
Xiujie Zhang ◽  
Xingbing Fu ◽  
Lu Hong ◽  
Yu Liu ◽  
Liangliang Wang

As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works can be executed offline. However, a challenging issue is the well-known identity-based online/offline encryption schemes unable to resist continual key leakage attacks of the secret keys. To address the above security challenge, we put forth the first continual leakage-resilient identity-based online/offline encryption scheme which is suitable for ensuring secure communications in wireless sensor networks. More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. Above all, compared to the existing identity-based online/offline encryption schemes, an identity-based online/offline encryption scheme with continual leakage resilient meets wireless sensor networks with strong security.


2021 ◽  
Vol 10 (1) ◽  
pp. 20
Author(s):  
Walter Tiberti ◽  
Dajana Cassioli ◽  
Antinisca Di Marco ◽  
Luigi Pomante ◽  
Marco Santic

Advances in technology call for a parallel evolution in the software. New techniques are needed to support this dynamism, to track and guide its evolution process. This applies especially in the field of embedded systems, and certainly in Wireless Sensor Networks (WSNs), where hardware platforms and software environments change very quickly. Commonly, operating systems play a key role in the development process of any application. The most used operating system in WSNs is TinyOS, currently at its TinyOS 2.1.2 version. The evolution from TinyOS 1.x and TinyOS 2.x made the applications developed on TinyOS 1.x obsolete. In other words, these applications are not compatible out-of-the-box with TinyOS 2.x and require a porting action. In this paper, we discuss on the porting of embedded system (i.e., Wireless Sensor Networks) applications in response to operating systems’ evolution. In particular, using a model-based approach, we report the porting we did of Agilla, a Mobile-Agent Middleware (MAMW) for WSNs, on TinyOS 2.x, which we refer to as Agilla 2. We also provide a comparative analysis about the characteristics of Agilla 2 versus Agilla. The proposed Agilla 2 is compatible with TinyOS 2.x, has full capabilities and provides new features, as shown by the maintainability and performance measurement presented in this paper. An additional valuable result is the architectural modeling of Agilla and Agilla 2, missing before, which extends its documentation and improves its maintainability.


2012 ◽  
Vol 112 (20) ◽  
pp. 783-787 ◽  
Author(s):  
Jaeheung Lee ◽  
Seokhyun Kim ◽  
Yookun Cho ◽  
Yoojin Chung ◽  
Yongsu Park

Sign in / Sign up

Export Citation Format

Share Document