Abstract

Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when applied to WSN. To this end, according to WSN’s characteristics and based on the identity-based encryption idea, an improved identity-based encryption algorithm (IIBE) is proposed, which can effectively simplify the key generation process, reduce the network traffic, and improve the network security. The design idea of this algorithm lies between the traditional public key encryption and identity-based public tweezers’ encryption. Compared with the traditional public key encryption, the algorithm does not need a public key certificate and avoids the management of the certificate. Compared with identity-based public key encryption, the algorithm addresses the key escrow and key revocation problems. The results of the actual network distribution experiments demonstrate that IIBE has low energy consumption and high security, which are suitable for application in WSN with high requirements on security.

Highlights

  • Wireless sensor networks (WSN) is a wireless network composed of sensor nodes in the form of self-organization, which collects and processes the relevant information of monitored objects in the target area and sends it to the observer [1,2,3,4,5,6,7,8,9,10].As early as the middle of the last century, there appeared a network which combined sensors with wireless transmitters and carried out real-time data acquisition, which was the prototype of WSN

  • Decrypt data with private key the above key escrow and revocation problems. e design idea is as follows: the user’s private key in the system is divided into two parts, one part is controlled by private key generator (PKG), and the other part is controlled by users themselves

  • Ten CC2530 nodes are used for network deployment, and all identitybased encryption algorithm (IIBE) nodes in WSN are not set to sleep

Read more

Summary

Introduction

WSN is a wireless network composed of sensor nodes in the form of self-organization, which collects and processes the relevant information of monitored objects in the target area and sends it to the observer [1,2,3,4,5,6,7,8,9,10]. As early as the middle of the last century, there appeared a network which combined sensors with wireless transmitters and carried out real-time data acquisition, which was the prototype of WSN. Information encryption is the most core and basic technical method to protect information security [16,17,18]. Cryptosystems are divided into two types: one is symmetric cryptosystems and the other is public key cryptosystems

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.