Abstract
The sensors in UWSN are vulnerable to malicious attack due to the transmission nature of wireless media under the water. Secure message delivery with low energy consumption is one of major aims in UWSN. In this paper, a Hierarchical Identity-based Signcryption (HIS) scheme is proposed for UWSN. Signcryption mechanism, which completes the signature and encryption in a single logical step, is adopted in the HIS scheme to decrease the communication and computation cost. The private keys of nodes are generated based on the node’s identity to decrease the communication cost. Two-layer architecture, cluster head layer and intra-cluster layer, is employed in the HIS scheme. Taking the difference on capacity between the cluster heads and ordinary nodes into account, we perform encrypting operations with different computation complexity in the two layers. The simulation results show that the HIS scheme outperforms ECC-CA, GLKM and AVM algorithm on energy consumption and time cost.
This work is partly supported by National Natural Science Foundation of China under grant 11671400.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tran, K., Oh, S.H.: UWSNs: a round-based clustering scheme for data redundancy resolve. Int. J. Distrib. Sens. Netw. 2(2014), 1–6 (2014)
Coutinho, R., Lourei, V., Roaaf, R.: Depth-controlled routing protocol for underwater sensor networks. In: 18th IEEE Symposium on Computers and Communications. IEEE Press, Split (2013)
Zhong, H., Zhang, Q., Tian, L., Wang, L.: Distributed key sharing based scheme for security clustering in unattended wireless sensor network. J. Commun. 5(36), 31–39 (2015)
Ajalakshmi, P., Logeshwa, R.: Performance analysis of cluster head selection routing protocol in underwater acoustic wireless sensor network. In: Internet Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp. 1005–1011 (2015)
Yuan, C., Chen, W., Zhu, Y., Li, D.: A low computational complexity authentication scheme in underwater wireless sensor network. In: International Conference on Mobile Ad-hoc & Sensor Networks, Shenzhen, China, pp. 116–123 (2015)
Oliveira, L.B., Dahab, R., Lopez, J.: Identity-based encryption for sensor networks. In: The 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, New York, USA (2007)
RSA Homepage. https://en.wikipedia.org/wiki/RSA_(cryptosystem)
Zhang, B., Wang, X.: ECC-based security clustering algorithm for wireless sensor network. J. Lanzhou Jiaotong Univ. 1(35), 20–24 (2016)
Li, F., Zhong, D.: A survey of digital signcryption. Netinfo Secur. 12, 1–8 (2011)
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234
Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3/4), 127–137 (2006)
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 1(20), 85–113 (2007)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Yang, M., AI-Anbuky, A., Liu, W.: An identity-based authentication protocol for sensor networks. In: 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE Press, Salvador (2014)
Wei, R., Zhao, D.: Key-management scheme based on identity and cluster layer for wireless sensor network. Eng. J. Wuhan Univ. 4(48), 580–583 (2015)
Guo, P., Zhang, H., Fu, D., Zhou, M.: Hybrid and lightweight cryptography for WSN. Comput. Sci. 1(39), 69–78 (2012)
Deng, S., Wang, Y.: Grouping and layered key management strategy in WSN based on EBS. Comput. Eng. 9(39), 64–68 (2013)
Sozer, E., Stojanovic, M., Proakis, J.: Underwater acoustic networks. IEEE J. Oceanic Eng. 1(25), 72–83 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yuan, C., Chen, W., Li, D. (2018). A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network. In: Li, J., et al. Wireless Sensor Networks. CWSN 2017. Communications in Computer and Information Science, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-10-8123-1_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-8123-1_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8122-4
Online ISBN: 978-981-10-8123-1
eBook Packages: Computer ScienceComputer Science (R0)