2018
DOI: 10.1007/978-981-10-8123-1_5
|View full text |Cite
|
Sign up to set email alerts
|

A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The security mechanisms designed for WSNs cannot be used in UWSNs because the resources are limited in UWSNs environment. Therefore, energy consumption should be considered while designing security mechanisms for UWSNs [71][72][73].…”
Section: Security In Uwsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…The security mechanisms designed for WSNs cannot be used in UWSNs because the resources are limited in UWSNs environment. Therefore, energy consumption should be considered while designing security mechanisms for UWSNs [71][72][73].…”
Section: Security In Uwsnsmentioning
confidence: 99%
“…The basic requirements of security in UWSNs environment are authentication, confidentiality, integrity, and availability [71,72].…”
Section: Security Requirements In Uwsnsmentioning
confidence: 99%
“…Related research has been presented for UWSNs in recent years [ 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 ]. Unfortunately, the existing cryptography and key management mechanisms are suffering from some problems, including cipher text expansion and computational complexity.…”
Section: Security Issues Of Uwsnsmentioning
confidence: 99%
“…Such mechanism really solves the key escrow problem in IBE algorithm. To evaluate the performance of the HMDS scheme, we compare it with the Hierarchical Identity-Based Signcryption Scheme (HIS) algorithm [15]. The experiment results show that the HMDS algorithm is more suitable for the WSN.…”
Section: Introductionmentioning
confidence: 99%