Security and performance analysis of identity based schemes in sensor networks

作者: K. Ragini , S. Sivasankar

DOI: 10.1109/ICIIECS.2015.7192881

关键词:

摘要: Security and efficient data transmission without any hurdles caused by external Attackers is an issue in sensor networks. This paper deals with the provision of assured To ensure this requirement Hash based Message Authentication Code (HMAC) Digest (MD) envisaged employing identity digital signature scheme (IBS). Identity encryption that generates operation developing secret code key protects during cryptanalysis. achieve above requisite modalities used HMAC MD5 which simulates functional efficiency &security

参考文章(12)
Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo, Secret signatures: how to achieve business privacy efficiently? workshop on information security applications. pp. 30- 47 ,(2007) , 10.1007/978-3-540-77535-5_3
Miodrag R. Bakmaz, Bojan M. Bakmaz, Zoran S. Bojkovic, Security Issues in Wireless Sensor Networks ,(2008)
Zhong-Hua Pang, Guo-Ping Liu, Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks IEEE Transactions on Control Systems and Technology. ,vol. 20, pp. 1334- 1342 ,(2012) , 10.1109/TCST.2011.2160543
Jinguang Han, Willy Susilo, Yi Mu, Identity-Based Secure DistributedData Storage Schemes IEEE Transactions on Computers. ,vol. 63, pp. 941- 953 ,(2014) , 10.1109/TC.2013.26
Qi Yanfeng, Tang Chunming, Lou Yu, Xu Maozhi, Guo Baoan, Certificateless proxy identity-based signcryption scheme without bilinear pairings China Communications. ,vol. 10, pp. 37- 41 ,(2013) , 10.1109/CC.2013.6674208
B.E. Jung, On the Forward Secrecy of Chikazawa–Yamagishi ID-Based Key Sharing Scheme IEEE Communications Letters. ,vol. 8, pp. 114- 115 ,(2004) , 10.1109/LCOMM.2004.823407
Huang Lu, Jie Li, Mohsen Guizani, Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 750- 761 ,(2014) , 10.1109/TPDS.2013.43
Huang Lu, Jie Li, Hisao Kameda, None, A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature global communications conference. pp. 1- 5 ,(2010) , 10.1109/GLOCOM.2010.5683084
K. Pradeepa, W. Regis Anne, S. Duraisamy, Design and Implementation Issues of Clustering in Wireless Sensor Networks International Journal of Computer Applications. ,vol. 47, pp. 23- 28 ,(2012) , 10.5120/7232-0163