2022
DOI: 10.1002/spy2.278
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC

Abstract: Authentication among the various communicating devices within wireless sensor networks during broadcasting is most significant among the other primary security services. This authentication during broadcasting services allows multiple mobile end-devices to transmit messages dynamically and securely for fasten consumer tracking and sustaining privacy of the data transferred in the insecure sensor network. To enhance this authentication protocol for secure end-users message distribution, this research work has i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…Identity-Based Cryptography has been already used in different solutions, like to make high-security multicasting in wireless sensor networks [29], to enhance authentication among the various communicating devices within wireless sensor networks during broadcasting for secure end-users message distribution [30], or to overcome the key management issue but still guarantee security even when attackers corrupt the keys, extending the FS-PEKS scheme (Lattice-Based Forward Secure Public-Key Encryption with Keyword Search) [31].…”
Section: E Cryptographic Backgroundmentioning
confidence: 99%
“…Identity-Based Cryptography has been already used in different solutions, like to make high-security multicasting in wireless sensor networks [29], to enhance authentication among the various communicating devices within wireless sensor networks during broadcasting for secure end-users message distribution [30], or to overcome the key management issue but still guarantee security even when attackers corrupt the keys, extending the FS-PEKS scheme (Lattice-Based Forward Secure Public-Key Encryption with Keyword Search) [31].…”
Section: E Cryptographic Backgroundmentioning
confidence: 99%
“…This research proposes an algorithm to digitally sign sensitive messages, using the ElGamal cryptosystem called Digital signature algorithm based on ElGamal, Diffie-Hellman protocol and the number π (DSAπ). It is mentioned that using the Diffie-Hellman protocol it is possible to construct a common key, both for the sender and the recipient: [1] performed an authentication between communication devices using an identifier based on ElGamal, the elliptic curve and the signature digital, which as a result, reduced computational complexity and facilitates key management; Similarly, [2] proposed a hybrid algorithm integrating Diffie-Hellman algorithm and Delta Encoding technique (Newton Forward and Backward Interpolation); [3] highlights the advantages of key management with Diffie Hellman algorithms, where an image encryption algorithm with seed-generated keys was proposed. Several systems have been developed with different approaches to sign messages in order to verify the authentication of these [4,5].…”
Section: Introductionmentioning
confidence: 99%