English  |  正體中文  |  简体中文  |  Items with full text/Total items : 27314/39158
Visitors : 2473920      Online Users : 76
RC Version 4.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search

Please use this identifier to cite or link to this item: http://ntour.ntou.edu.tw:8080/ir/handle/987654321/50893

Title: Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network
Authors: Pei-Yih Ting
Jia-Lun Tsai
Tzong-Sun Wu
Contributors: 國立臺灣海洋大學:資訊工程學系
Keywords: Wireless sensor networks
Public key
Biomedical monitoring
Date: 2017-06
Issue Date: 2018-10-29T07:49:49Z
Publisher: IEEE Systems Journal
Abstract: Abstract: Internet of Things (IoT) consists of scenarios in which real-world appliances, objects, animals or people with unique identifiers transfer data over an insecure wireless network to accomplish specific tasks without any physical interaction. To achieve the specified goal, wireless sensor networks (WSNs) are usually connected to the Internet and integrated as part of the IoT. In such environments, how to send a message securely from a sensor to an Internet host becomes an important issue for the successful functioning of the IoT. In this paper, a new, efficient, heterogeneous online/offline signcryption scheme is proposed. This scheme achieves the security goals of confidentiality, integrity, authentication, and nonrepudiation in a logical single step. In particular, its structure allows a sensor node in an identity-based cryptography (IBC) setup to send a message to an Internet host in a public key infrastructure (PKI) such that the heavy verification loads on low-power devices are mitigated. The proposed signcryption scheme is divided into the offline and the online signcrypt stages for further load mitigation. The first stage handles most part of computations in generating a ciphertext before knowing the message. Only a few operations are left for the second stage when the messages show up. This scheme is indistinguishable against adaptive chosen-ciphertext attacks under the computational Diffie–Hellman assumption, and is unforgeable against adaptive chosen-message attacks under the elliptic curve discrete logarithm assumption. As compared with other related works, the proposed scheme has lower computation costs on both the sensor and the host sides and is more power efficient and scalable for various IoT scenarios.
Relation: 12(3) pp.2385-2394
URI: http://ntour.ntou.edu.tw:8080/ir/handle/987654321/50893
Appears in Collections:[資訊工程學系] 期刊論文

Files in This Item:

File Description SizeFormat

All items in NTOUR are protected by copyright, with all rights reserved.


著作權政策宣告: 本網站之內容為國立臺灣海洋大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,請合理使用本網站之內容,以尊重著作權人之權益。
網站維護: 海大圖資處 圖書系統組
DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback