2019
DOI: 10.1142/s0218127419501189
|View full text |Cite
|
Sign up to set email alerts
|

ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks

Abstract: As a basic and crucial security requirement for Wireless Sensor Networks (WSNs), authentication is generally used to prevent various communication attacks such as Denial-of-Service (DoS) attack. A novel broadcast authentication framework is proposed in this paper, where an Identity-Based Signature scheme by using the Extended Chaotic Maps (ECM-IBS) is designed to authenticate all broadcast messages and specifically, a chaos-based hash function is used for message authentication in the WSNs. It is implemented u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 40 publications
(42 reference statements)
0
6
0
Order By: Relevance
“…Whilst, the peak signal to noise ratio (PSNR) measurement is commonly utilized to assess the quality of restored images. The formulas (10) and (11)…”
Section: Plain Image Sensitivity (Analysis Of Differential Attack)mentioning
confidence: 99%
See 1 more Smart Citation
“…Whilst, the peak signal to noise ratio (PSNR) measurement is commonly utilized to assess the quality of restored images. The formulas (10) and (11)…”
Section: Plain Image Sensitivity (Analysis Of Differential Attack)mentioning
confidence: 99%
“…Consequently, Chebyshev's chaotic map-based schemes used reduced battery life and small computation capacity. Therefore, it is more suited for IoT devices [11]. The logistic map is a one-dimensional recursive mapping that creates chaos in the system by producing pseudo-random numbers.…”
Section: Introductionmentioning
confidence: 99%
“…Like regular hashes, keyed variants can ensure the integrity of a message, though this is extended further to provide authentication (by use of a key) for the message. In Ref [36], authors have utilised chaotic map i.e., Chebyshev for broadcast authentication and chaos-based hashing. All broadcast messages were authenticated via chaos maps.…”
Section: Absolute-value Chaotic Hash Functionmentioning
confidence: 99%
“…Shim et al [35] proposed an identity-based broadcast authentication scheme called EIBAS using ID-based signature. Similarly, a Chebyshev-map-based broadcast authentication is presented by Luo et al, which also uses IDbased signature [8]. However, the overhead of ID-based signature is higher than symmetric primitive.…”
Section: Broadcasting Authentication Protocol In Wsnsmentioning
confidence: 99%
“…For effectively acquiring and perceiving data from massive sensors, the base station (or edge server) usually sends commands or application updating data packets to vast sensor nodes through broadcasting. It is necessary for sensor nodes to authenticate the identity of the sender, together with the validity and integrity of these messages [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%