2022
DOI: 10.1002/cpe.7430
|View full text |Cite
|
Sign up to set email alerts
|

Secure multicasting in wireless sensor networks using identity based cryptography

Abstract: Security in wireless sensor networks (WSNs) is challenging, owing to resource, computing, and environmental constraints. Researchers have proposed several security systems for multicasting in WSNs, but none have offered foolproof security. To make high-security multicasting a reality, the proposed I-RLNMCDS-ODMRP protocol uses state-of-the-art techniques such as identity-based cryptography, random linear network coding, the minimum connected dominating set, and the on-demand multicast routing protocol. Also, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…The results of the tests confirm that the picture decryption is quite sensitive to small changes in the transformation orders. The Arnold Transformation Period, as reported by [ 16 ] is a critical limit that affects the efficiency of our application in the domains of image encryption, digital watermarking, concealed data, and so on. Although the results of previous research on an alternative two-dimensional Arnold advancement are difficult to evaluate and call for practical application value, they do exist.…”
Section: Literature Surveymentioning
confidence: 99%
“…The results of the tests confirm that the picture decryption is quite sensitive to small changes in the transformation orders. The Arnold Transformation Period, as reported by [ 16 ] is a critical limit that affects the efficiency of our application in the domains of image encryption, digital watermarking, concealed data, and so on. Although the results of previous research on an alternative two-dimensional Arnold advancement are difficult to evaluate and call for practical application value, they do exist.…”
Section: Literature Surveymentioning
confidence: 99%
“…Identity-Based Cryptography has been already used in different solutions, like to make high-security multicasting in wireless sensor networks [29], to enhance authentication among the various communicating devices within wireless sensor networks during broadcasting for secure end-users message distribution [30], or to overcome the key management issue but still guarantee security even when attackers corrupt the keys, extending the FS-PEKS scheme (Lattice-Based Forward Secure Public-Key Encryption with Keyword Search) [31].…”
Section: E Cryptographic Backgroundmentioning
confidence: 99%