We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT

by Benjamin Klugah-brown, John Bosco Aristotle Kanpogninge Ansuura, Xia Qi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 9
Year of Publication: 2015
Authors: Benjamin Klugah-brown, John Bosco Aristotle Kanpogninge Ansuura, Xia Qi
10.5120/21255-4099

Benjamin Klugah-brown, John Bosco Aristotle Kanpogninge Ansuura, Xia Qi . A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT. International Journal of Computer Applications. 120, 9 ( June 2015), 16-23. DOI=10.5120/21255-4099

@article{ 10.5120/21255-4099,
author = { Benjamin Klugah-brown, John Bosco Aristotle Kanpogninge Ansuura, Xia Qi },
title = { A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 9 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number9/21255-4099/ },
doi = { 10.5120/21255-4099 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:47.163460+05:30
%A Benjamin Klugah-brown
%A John Bosco Aristotle Kanpogninge Ansuura
%A Xia Qi
%T A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 9
%P 16-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network (WNS) is now an inevitable component of the internet of things (IoT), this integration creates new security challenges that exist between the sensor nodes and the internet host, thus, issue regarding setting up a non-compromised channel between these two ends. In this scheme we required that the sender of the message belongs to the internet host where huge computation can be done without incurring any delays or computational problem while the receiver belongs to the sensor node. The scheme is shown to be suitable and secure using random oracle of bilinear Diffie-Hellman assumption hence providing strong security for wireless sensors into internet of things.

References
  1. F. Li and P. Xiong, Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sensors Journal, 13(10), pp. 3677–3684, 2013
  2. S. S. Al-Riyami and K. G. Paterson, Certificateless Public-Key Cryptography. Advances in Cryptology-ASIACRYPT, LNCS 2894: pp. 452-473, 2003
  3. M. Barbosa and P. Farshim, Certificateless Signcryption. Proceedings of the 2008 ACM symposium on Information, computer and communications security, pp. 369 372, 2008
  4. J. Malone-Lee, Identity-based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002
  5. P. LI, M. HE, X. LI and W. LIU, Efficient and Provably Secure certificateless Signcryption from Bilinear Pairings, JCIS 6:11, pp. 3643-3650, 2010
  6. Y. Zheng,H. Imai. How to Construct Efficient Signcryption Schemes on Elliptic Curves. Information Processing Letters, 68(5): pages 227-233, 1998
  7. F. Zhang. A New Provably Secure Certificateless Signature. proceedings of ICC08, pages 1685-1689,2008
  8. D. Boneh and M. Franklin. Identity-Based Encryption,SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213229, Springer-Verlag, 2001
  9. F. Li, M. Shirase, T. Takagi, "Certificateless hybrid signcryption", Mathematical and Computer Modelling, vol. 57, pp. 324-343, 2013.
  10. F. Monrose, M. Reiter, Q. Li, et al, "Towards voice generated cryptographic keys on resource constrained device", in: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, pp. 1-14, 2002.
  11. Z. Liu, Y. Hu, X. Zhang, H. Ma. Certificateless Signcryption Scheme in the Standard Model. Information Sciences, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network Internet of things security Certificateless signcryption identity-based cryptography