2021
DOI: 10.1002/dac.4764
|View full text |Cite
|
Sign up to set email alerts
|

ESS‐IBAA: Efficient, short, and secure ID‐based authentication algorithm for wireless sensor network

Abstract: Summary Designing an efficient, short, and secure authentication algorithm for resource‐constrained sensor nodes of wireless sensor networks (WSNs) is a challenging task. Authentication in WSNs is mainly performed by the digital signature algorithm. In this paper, we propose an efficient, short, and secure pairing computation‐free ID‐based authentication algorithm (signature scheme) ESS‐IBAA for WSNs which completely follows the rule of identity‐based cryptosystem. Identity‐based schemes, unlike traditional pu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 45 publications
(99 reference statements)
0
5
0
Order By: Relevance
“…However, the high cost of pairing computation and long signature size can be a problem for the implementation process in low-bandwidth environments (e.g., cell phones where most users use social media) [34]. A pairing-free scheme has also been proposed as an alternative approach for generating a faster and shorter signature generation over an elliptic curve [34,35]. Moreover, since the signature is a point element in an elliptic curve, we can shorten the signature size by performing point compression and decompression [36].…”
Section: E Identity-based Signature (Ibs)mentioning
confidence: 99%
See 2 more Smart Citations
“…However, the high cost of pairing computation and long signature size can be a problem for the implementation process in low-bandwidth environments (e.g., cell phones where most users use social media) [34]. A pairing-free scheme has also been proposed as an alternative approach for generating a faster and shorter signature generation over an elliptic curve [34,35]. Moreover, since the signature is a point element in an elliptic curve, we can shorten the signature size by performing point compression and decompression [36].…”
Section: E Identity-based Signature (Ibs)mentioning
confidence: 99%
“…b: Generating signature Considering the signature length and the computational cost, we choose to implement a modified scheme of Yaduvanshi's [34] and Mishra's [35] methods. The scheme is divided into four stages, setup, user key extraction, signature generation, and signature verification.…”
Section: ) Hash and Signature Embedding Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Adaptive self-configuring sEnsor networks topologies (ASCENT) [ 18 ], PEAS, PECAS, Low-energy adaptive clustering hierarchy (LEACH-GA) [ 23 ], IBLEACH [ 24 ], energy-efficient surveillance system (ESS) [ 25 ] and BS [ 20 ] do not take complete coverage of the region as their primary goal. Cooperative spectrum sensing (CSS) [ 22 ], however, is the opposite.…”
Section: Related Workmentioning
confidence: 99%
“…This is a goal that is hard not to consider. 131 ASCENT [18], PEAS, PECAS, LEACH-GA [19], IBLEACH [20], ESS [23], OGDC 132 [24], and BS does not regard complete coverage of the region as their primary goal.…”
mentioning
confidence: 99%