Skip to main content
Log in

An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

The experimental data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Oliveira, L. B., Dahab, R., Lopez, J., Daguano, F., & Loureiro, A. A. F. (2007). Identity-Based Encryption for Sensor Networks. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp. 290–294.

  2. Yang, G., Chun-Ming, R., Christian, V., Wang, J. T., & Hong-Bing, C. (2006). Identity-based key agreement and encryption for wireless sensor networks. Journal of China University of Posts and Telecommunications, 13(4), 54–60.

    Article  Google Scholar 

  3. Y. Mohd Yussoff, H. Hashim and M. D. Baba, "Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks," 2012 IEEE Control and System Graduate Research Colloquium, 2012, pp. 313–317

  4. Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. (2020). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, 26(5), 3169–3182.

    Article  Google Scholar 

  5. Yussoff, Y. M., & Hashim, H. (2011). IBE-Trust: A security framework for Wireless Sensor Networks. In 2011 World Congress on Internet Security (WorldCIS-2011), pp. 171–176.

  6. Yang, G., & Cheng, H. B. (2008). An efficient key agreement scheme for wireless sensor networks. Journal of Electronics (China), 04, 495–502.

    Google Scholar 

  7. Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903–4914.

    Article  Google Scholar 

  8. Pei, Q., Li, H., Pang, L., & Yin, H. (2010). Dynamic cluster key management scheme on wireless sensor networks. China Communications, 7(01), 73–79.

    Google Scholar 

  9. Babu, M. V., Alzubi, J. A., Sekaran, R., Patan, R., Ramachandran, M., & Gupta, D. (2021). An improved IDAF-FIT clustering based ASLPP-RR routing with secure data aggregation in wireless sensor network. Mobile Networks and Applications, 26(3), 1059–1067.

    Article  Google Scholar 

  10. Xiong, X., Wong, D. S., & Deng, X. (2010). TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. IEEE Wireless Communication and Networking Conference, 2010, 1–6.

    Google Scholar 

  11. Udhayavani, M., & Chandrasekaran, M. (2019). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks. Cluster Computing, 22(5), 11919–11927.

    Article  Google Scholar 

  12. A. Praveena, S. Devasena and K. M. A. Chelvan, "Achieving energy efficient and secure communication in wireless sensor networks," 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, pp. 5 pp.-5

  13. Kim I, Hwang S O. An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks. Ieice Transactions on Communications, 2013, E96.B(3):891–895.

  14. Liu, Y., Wu, X. & Chen, X. (2015). A scheme for key distribution in wireless sensor network based on Hierarchical Identity-Based Encryption. In 2015 IEEE 12th International Conference on Networking, Sensing and Control, 2015, Taipei, Taiwan pp. 539–543

  15. Chu, C. K., Liu, J. K., Zhou, J., Bao, F., & Deng, R. H. (2010). Practical ID-based encryption for wireless sensor network. In 5th ACM symposium on information, computer and communications security 2009, 2010, Beijing(CN) pp. 337–340

  16. Rodrigues, P., & John, J. (2020). Joint trust: An approach for trust-aware routing in WSN. Wireless Networks, 26(5), 3553–3568.

    Article  Google Scholar 

  17. Jan, M. A., Khan, F., Khan, R., Mastorakis, S., Menon, V. G., Alazab, M., & Watters, P. (2020). Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS. IEEE Transactions on Industrial Informatics, 17(8), 5829–5839.

    Article  Google Scholar 

  18. Azees, M., Vijayakumar, P., Karuppiah, M., & Nayyar, A. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 27(3), 2119–2130.

    Article  Google Scholar 

Download references

Funding

This work was supported by Henan Province Higher Education Training Program for Young Core Teachers, Grant No: 2021GGJS192. This work was supported by Henan Province Higher Education Training Program for Young Core Teachers Grant No:2019GGJS280.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Na Yang.

Ethics declarations

Conflict of interest

The authors declared that they have no conflicts of interest regarding this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, N. An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks. Wireless Netw 28, 3493–3502 (2022). https://doi.org/10.1007/s11276-022-03026-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03026-5

Keywords

Navigation