2018
DOI: 10.1109/jsyst.2017.2730580
|View full text |Cite
|
Sign up to set email alerts
|

Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(27 citation statements)
references
References 33 publications
0
27
0
Order By: Relevance
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach we propose in this paper improves the ones reported in this section under several aspects. First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al nor the use of uncommon certificate formats and schemes like in other works . Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems.…”
Section: Related Workmentioning
confidence: 99%
“…First of all, it is more general because it does not assume any specific network topology such as that in the work of Hummen et al 11 nor the use of uncommon certificate formats and schemes like in other works. 12,[17][18][19][20] Indeed, although in this work we propose a new type of certificate to further improve the performances of the proposed solution, its use is not mandatory, and this enables an easy interoperability of the proposed architecture with already deployed systems. Moreover, unlike other reported approaches, our solution allows also constrained nodes to trigger the establishment of a secure connection, which is an event that is going to be much more common in the considered open and decentralized scenario than in classic IoT contexts.…”
Section: Related Workmentioning
confidence: 99%
“…Shim [26] has presented an authentication scheme where ID based encryption mechanism has been used along with the signature scheme. Adoption of the signcryption has been seen in work of Ting et al [27] where identity-based encryption and public key infrastructure has been used. Wei et al [28] have used similar identity-based security scheme where signature policy has been constructive for secure sharing among the users.…”
Section: A Backgroundmentioning
confidence: 99%
“…Secure routing: Number of security and privacy mechanism adopting cryptography has been presented recently for WSN [24], [25], [26], and [27]. In [24] discussed the need for provisioning security for tracking, navigation and localization of sensor device for sensor network.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, sharing keys among communicating device is challenging under homogenous network. In [26] proposed signcryption scheme which is composed of two stage such as offline and the online signcrypt stages. They showed that identity-based cryptography (IBC) setup for transmitting packet to a gateway in a public key infrastructure (PKI) can reduce heavy verification loads on low-power sensor devices.…”
Section: Introductionmentioning
confidence: 99%