2018
DOI: 10.1109/tii.2017.2784395
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

Abstract: The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to cyber security, particularly the data confidentiality in cloud-assisted WSNs (CWSNs). Searchable public-key encryption (SPE) is a promising method to address this problem. In theory, it allows sensors to upload public-key ciphertexts to the cloud, and the owner of these sens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
69
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(70 citation statements)
references
References 40 publications
(42 reference statements)
1
69
0
Order By: Relevance
“…A variety of solutions are proposed using various cryptographic algorithms and protocols [139][140][141][142][143] and architectures using supporting authentication servers [144][145][146].…”
Section: Research In Secure Data Transmissionmentioning
confidence: 99%
“…A variety of solutions are proposed using various cryptographic algorithms and protocols [139][140][141][142][143] and architectures using supporting authentication servers [144][145][146].…”
Section: Research In Secure Data Transmissionmentioning
confidence: 99%
“…Standard SPE [23] Conjunctive keyword search -- [24] Conjunctive keyword search -- [22] Disjunctive keyword search -- [3] Range, conjunctive keywords, subset search -- [5] Conjunctive and disjunctive keyword search -- [25] Range search --Special SPE [26] Conjunctive keyword search Verifiable - [27] Conjunctive keyword search Verifiable - [28] Single keyword search Verifiable and Access control - [29] Single keyword search -Yes [30] Single keyword search -Yes [31] Fuzzy keyword search Access control -…”
Section: Query Condition Additional Security Measures Fast Searchmentioning
confidence: 99%
“…After which the study has introduced different key generation methods based on power and error-correcting codes, which enables a mechanism for generating keys by reading received signal strength-(RSS) value. Xu et al [20] presented a search based lightweight approach for establishing a public-key encryption technique for cloud-integrated WSN. The outcome demonstrates that the presented approach provides a time-efficient mechanism for generation chipper text to provide energy efficiency and a secure communication environment.…”
Section: Introductionmentioning
confidence: 99%