A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 812)

Abstract

The sensors in UWSN are vulnerable to malicious attack due to the transmission nature of wireless media under the water. Secure message delivery with low energy consumption is one of major aims in UWSN. In this paper, a Hierarchical Identity-based Signcryption (HIS) scheme is proposed for UWSN. Signcryption mechanism, which completes the signature and encryption in a single logical step, is adopted in the HIS scheme to decrease the communication and computation cost. The private keys of nodes are generated based on the node’s identity to decrease the communication cost. Two-layer architecture, cluster head layer and intra-cluster layer, is employed in the HIS scheme. Taking the difference on capacity between the cluster heads and ordinary nodes into account, we perform encrypting operations with different computation complexity in the two layers. The simulation results show that the HIS scheme outperforms ECC-CA, GLKM and AVM algorithm on energy consumption and time cost.

Keywords

Identity-Based Encryption Signcryption Vandermonde Matrix Wireless Sensor Network 

References

  1. 1.
    Tran, K., Oh, S.H.: UWSNs: a round-based clustering scheme for data redundancy resolve. Int. J. Distrib. Sens. Netw. 2(2014), 1–6 (2014)Google Scholar
  2. 2.
    Coutinho, R., Lourei, V., Roaaf, R.: Depth-controlled routing protocol for underwater sensor networks. In: 18th IEEE Symposium on Computers and Communications. IEEE Press, Split (2013)Google Scholar
  3. 3.
    Zhong, H., Zhang, Q., Tian, L., Wang, L.: Distributed key sharing based scheme for security clustering in unattended wireless sensor network. J. Commun. 5(36), 31–39 (2015)Google Scholar
  4. 4.
    Ajalakshmi, P., Logeshwa, R.: Performance analysis of cluster head selection routing protocol in underwater acoustic wireless sensor network. In: Internet Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp. 1005–1011 (2015)Google Scholar
  5. 5.
    Yuan, C., Chen, W., Zhu, Y., Li, D.: A low computational complexity authentication scheme in underwater wireless sensor network. In: International Conference on Mobile Ad-hoc & Sensor Networks, Shenzhen, China, pp. 116–123 (2015)Google Scholar
  6. 6.
    Oliveira, L.B., Dahab, R., Lopez, J.: Identity-based encryption for sensor networks. In: The 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, New York, USA (2007)Google Scholar
  7. 7.
  8. 8.
    Zhang, B., Wang, X.: ECC-based security clustering algorithm for wireless sensor network. J. Lanzhou Jiaotong Univ. 1(35), 20–24 (2016)Google Scholar
  9. 9.
    Li, F., Zhong, D.: A survey of digital signcryption. Netinfo Secur. 12, 1–8 (2011)Google Scholar
  10. 10.
    Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997).  https://doi.org/10.1007/BFb0052234 CrossRefGoogle Scholar
  11. 11.
    Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3/4), 127–137 (2006)CrossRefGoogle Scholar
  12. 12.
    Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 1(20), 85–113 (2007)MathSciNetCrossRefMATHGoogle Scholar
  13. 13.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985).  https://doi.org/10.1007/3-540-39568-7_5 CrossRefGoogle Scholar
  14. 14.
    Yang, M., AI-Anbuky, A., Liu, W.: An identity-based authentication protocol for sensor networks. In: 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE Press, Salvador (2014)Google Scholar
  15. 15.
    Wei, R., Zhao, D.: Key-management scheme based on identity and cluster layer for wireless sensor network. Eng. J. Wuhan Univ. 4(48), 580–583 (2015)Google Scholar
  16. 16.
    Guo, P., Zhang, H., Fu, D., Zhou, M.: Hybrid and lightweight cryptography for WSN. Comput. Sci. 1(39), 69–78 (2012)Google Scholar
  17. 17.
    Deng, S., Wang, Y.: Grouping and layered key management strategy in WSN based on EBS. Comput. Eng. 9(39), 64–68 (2013)Google Scholar
  18. 18.
    Sozer, E., Stojanovic, M., Proakis, J.: Underwater acoustic networks. IEEE J. Oceanic Eng. 1(25), 72–83 (2000)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of InformationRenmin UniversityBeijingChina

Personalised recommendations