Abstract
Wireless sensor networks (WSNs) are being employed in a growing variety of fields for efficient monitoring and data collection about events that would be impossible with conventional computing platforms. WSNs are self-organizing networks that collects and processes important information via their resource-constrained sensor nodes and provide valuable information about happening events. The unattended nature of sensor nodes in these networks makes them vulnerable to a wide range of threats, and the resource limitations imposed on their nodes complicate things even more while monitoring the target regions. This study relies on an identity-based encryption (IBE) approach to protect these nodes' resources while ensuring that they collect valuable data from the target regions. IBE simplifies the key generation process in these networks and at the same time improves the network security up to a sufficient level. For this purpose, an identity-based encryption online/offline (IBOOE) algorithm is proposed as a more acceptable solution to the security concerns of these nodes. IBOOE improves on the previous algorithm, i.e., IBE, by splitting the encryption into two phases: offline and online. The offline phase is mainly responsible for complicated and resource-intensive operations, e.g. exponential operation and pairing operation. The online phase, on the other hand, is mainly responsible for relatively easy calculations such as integer multiplication or hash operation. The comparison of the proposed IBOOE against the state of the art work, i.e., IBE, clearly demonstrates the efficiency and effectiveness of the proposed work.
Similar content being viewed by others
Data Availability
The experimental data used to support the findings of this study are available from the corresponding author upon request.
References
Oliveira, L. B., Dahab, R., Lopez, J., Daguano, F., & Loureiro, A. A. F. (2007). Identity-Based Encryption for Sensor Networks. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp. 290–294.
Yang, G., Chun-Ming, R., Christian, V., Wang, J. T., & Hong-Bing, C. (2006). Identity-based key agreement and encryption for wireless sensor networks. Journal of China University of Posts and Telecommunications, 13(4), 54–60.
Y. Mohd Yussoff, H. Hashim and M. D. Baba, "Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks," 2012 IEEE Control and System Graduate Research Colloquium, 2012, pp. 313–317
Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. (2020). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, 26(5), 3169–3182.
Yussoff, Y. M., & Hashim, H. (2011). IBE-Trust: A security framework for Wireless Sensor Networks. In 2011 World Congress on Internet Security (WorldCIS-2011), pp. 171–176.
Yang, G., & Cheng, H. B. (2008). An efficient key agreement scheme for wireless sensor networks. Journal of Electronics (China), 04, 495–502.
Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903–4914.
Pei, Q., Li, H., Pang, L., & Yin, H. (2010). Dynamic cluster key management scheme on wireless sensor networks. China Communications, 7(01), 73–79.
Babu, M. V., Alzubi, J. A., Sekaran, R., Patan, R., Ramachandran, M., & Gupta, D. (2021). An improved IDAF-FIT clustering based ASLPP-RR routing with secure data aggregation in wireless sensor network. Mobile Networks and Applications, 26(3), 1059–1067.
Xiong, X., Wong, D. S., & Deng, X. (2010). TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. IEEE Wireless Communication and Networking Conference, 2010, 1–6.
Udhayavani, M., & Chandrasekaran, M. (2019). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks. Cluster Computing, 22(5), 11919–11927.
A. Praveena, S. Devasena and K. M. A. Chelvan, "Achieving energy efficient and secure communication in wireless sensor networks," 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, pp. 5 pp.-5
Kim I, Hwang S O. An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks. Ieice Transactions on Communications, 2013, E96.B(3):891–895.
Liu, Y., Wu, X. & Chen, X. (2015). A scheme for key distribution in wireless sensor network based on Hierarchical Identity-Based Encryption. In 2015 IEEE 12th International Conference on Networking, Sensing and Control, 2015, Taipei, Taiwan pp. 539–543
Chu, C. K., Liu, J. K., Zhou, J., Bao, F., & Deng, R. H. (2010). Practical ID-based encryption for wireless sensor network. In 5th ACM symposium on information, computer and communications security 2009, 2010, Beijing(CN) pp. 337–340
Rodrigues, P., & John, J. (2020). Joint trust: An approach for trust-aware routing in WSN. Wireless Networks, 26(5), 3553–3568.
Jan, M. A., Khan, F., Khan, R., Mastorakis, S., Menon, V. G., Alazab, M., & Watters, P. (2020). Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS. IEEE Transactions on Industrial Informatics, 17(8), 5829–5839.
Azees, M., Vijayakumar, P., Karuppiah, M., & Nayyar, A. (2021). An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks, 27(3), 2119–2130.
Funding
This work was supported by Henan Province Higher Education Training Program for Young Core Teachers, Grant No: 2021GGJS192. This work was supported by Henan Province Higher Education Training Program for Young Core Teachers Grant No:2019GGJS280.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflicts of interest regarding this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yang, N. An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks. Wireless Netw 28, 3493–3502 (2022). https://doi.org/10.1007/s11276-022-03026-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03026-5