2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2019
DOI: 10.1109/pimrc.2019.8904276
|View full text |Cite
|
Sign up to set email alerts
|

IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Cryptography is the mathematical basis for all security mechanisms [23]. For instance, cryptographic-based strategies are significant methods to achieve privacy data protection [24] and digital forensic inspection [25].…”
Section: Cryptography In Wsnsmentioning
confidence: 99%
See 2 more Smart Citations
“…Cryptography is the mathematical basis for all security mechanisms [23]. For instance, cryptographic-based strategies are significant methods to achieve privacy data protection [24] and digital forensic inspection [25].…”
Section: Cryptography In Wsnsmentioning
confidence: 99%
“…Signature Cryptography: An Overview IBC-based schemes can be implemented with two main cryptographic approaches: Elliptic Curve Cryptography (ECC) and pairing-based cryptography (PBC) [23]. The focus of this paper is PBC.…”
Section: Identity-based Combined Encryption Andmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it fails to provide integrity and privacy in a resource‐constrained wireless network environment. Mezrag et al 21 proposed an IBC‐based security protocol for cluster‐based wireless sensor networks. The scheme's advantages include guaranteed secure communication and sound protection against cyber‐attacks, an efficient key storage mechanism, and lower energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…The CipherValue of the EncryptedData element contains the encrypted data, whereas the EncryptedKey element keeps the encrypted key. To learn more about a certain key, go no farther than the KeyInfo element, which is a child of the EncryptedKey element [6]. The KeyInfo's EncryptionMethod field specifies the asymmetric encryption algorithm used to encrypt the session key.…”
Section: The Verification Process Of a Digital Signaturementioning
confidence: 99%