Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

@article{Babamir2012DataSI,
  title={Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption},
  author={Faezeh Sadat Babamir and Ziba Eslami},
  journal={KSII Trans. Internet Inf. Syst.},
  year={2012},
  volume={6},
  pages={2940-2955}
}
In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time… 

Figures and Tables from this paper

Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare

TLDR
This paper addresses security problems and improves the first study of identity-based aggregate signcryption in UWSNs to achieve both key privacy and invisibility and shows that the proposed scheme has resistance against reading and modifying attacks.

An Obfuscatable Aggregatable Signcryption Scheme for Unattended Devices in IoT Systems

TLDR
A novel and specialized obfuscatable aggregatable signcryption scheme (OASC) together with an obfuscator for the signc encryption algorithm, which has been designed by taking into account that the computational and communication costs should be sufficiently small to fit applications in resource-constrained embedded devices.

A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs

TLDR
This work proposes a traceable concurrent data anonymous transmission scheme for heterogeneous VANETs based on certificateless aggregate signcryption, so it supports batch verification and conditional anonymity, and is a pairing-free scheme for the merit of multi-trapdoor hash functions.

Energy efficient aggregation technique-based realisable secure aware routing protocol for wireless sensor network

TLDR
A realisable secure aware routing (RSAR) protocol: RSAR method to overcome the issue of data overhead, which leads to complications like congestion into the system and the overall lifetime of the network is drastically brought down.

Lattice-based obfuscation for re-encryption functions

TLDR
This paper construct a new re-encryption function and securely obfuscate it based on the standard learning with error LWE assumption, which is proved to be reducible to standard lattice problems, which are conjectured immune to quantum cryptanalysis or 'post-quantum'.

Genetic Algorithm Application in Optimization of Wireless Sensor Networks

TLDR
The present survey tries to exert a comprehensive improvement in all operational stages of a WSN including node placement, network coverage, clustering, and data aggregation and achieve an ideal set of parameters of routing and application based WSN.

Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes

TLDR
In this article, the interaction between architectural tactics and architectural styles, namely “availability” and “performance”, and Architectural styles, including “pipe & filter’, “layered”), is evaluated, and then, a new ranking scheme for the architectural styles is proposed.

References

SHOWING 1-10 OF 33 REFERENCES

Collaborative authentication in unattended WSNs

TLDR
This paper proposes two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication and shows that proposed schemes cope well with real WSN issues, such as message loss and sensor failure.

Acquiring Authentic Data in Unattended Wireless Sensor Networks

TLDR
This paper exploits the collaboration among sensors to address the authentication problem and proposes a scheme, called AAD, to Acquire Authentic Data in UWSNs that has superior resilience against sensor compromises, PDoS attack, and FEDoS attack.

Extended Abstract: Forward-Secure Sequential Aggregate Authentication

  • Di MaG. Tsudik
  • Computer Science
    2007 IEEE Symposium on Security and Privacy (SP '07)
  • 2007
TLDR
This work represents the initial investigation of forward-secure aggregation and, although the proposed schemes are not optimal, it believes it opens a new direction for follow-on research.

An Efficient Identity-Based Signcryption Scheme for Multiple Receivers

TLDR
A new scheme is proposed that achieves both confidentiality and authenticity simultaneously in this setting and is the most efficient scheme to date, in the parameters described above.

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks

TLDR
This paper systematically identifies two important security requirements of pairwise key setup in wireless sensor networks, namely opaqueness and inoculation and proposes a new opaque transitory master key (OTMK) scheme for pairwiseKey setup in sensor networks.

Practical forward secure sequential aggregate signatures

  • Di Ma
  • Computer Science, Mathematics
    ASIACCS '08
  • 2008
TLDR
Two more practical FssAgg1 signature schemes are proposed, derived from existing forward secure signature schemes, that have constant-size public and private keys, constant- size signatures as well as constant-time key update and signature generation complexity.

A Survey of Identity-based Signcryption

TLDR
The state-of-the-art of identity-based signcryption (IBSC), a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach is surveyed.

On the application of pairing based cryptography to wireless sensor networks

TLDR
This work presents the first in-depth study on the application and implementation of PBC to Wireless Sensor Networks (WSNs), and presents a novel variant of the key exchange protocol which can be useful in even more demanding applications, and which partially solves the problem of node compromise attacks.