Skip to main content

A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 812))

Abstract

The sensors in UWSN are vulnerable to malicious attack due to the transmission nature of wireless media under the water. Secure message delivery with low energy consumption is one of major aims in UWSN. In this paper, a Hierarchical Identity-based Signcryption (HIS) scheme is proposed for UWSN. Signcryption mechanism, which completes the signature and encryption in a single logical step, is adopted in the HIS scheme to decrease the communication and computation cost. The private keys of nodes are generated based on the node’s identity to decrease the communication cost. Two-layer architecture, cluster head layer and intra-cluster layer, is employed in the HIS scheme. Taking the difference on capacity between the cluster heads and ordinary nodes into account, we perform encrypting operations with different computation complexity in the two layers. The simulation results show that the HIS scheme outperforms ECC-CA, GLKM and AVM algorithm on energy consumption and time cost.

This work is partly supported by National Natural Science Foundation of China under grant 11671400.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Tran, K., Oh, S.H.: UWSNs: a round-based clustering scheme for data redundancy resolve. Int. J. Distrib. Sens. Netw. 2(2014), 1–6 (2014)

    Google Scholar 

  2. Coutinho, R., Lourei, V., Roaaf, R.: Depth-controlled routing protocol for underwater sensor networks. In: 18th IEEE Symposium on Computers and Communications. IEEE Press, Split (2013)

    Google Scholar 

  3. Zhong, H., Zhang, Q., Tian, L., Wang, L.: Distributed key sharing based scheme for security clustering in unattended wireless sensor network. J. Commun. 5(36), 31–39 (2015)

    Google Scholar 

  4. Ajalakshmi, P., Logeshwa, R.: Performance analysis of cluster head selection routing protocol in underwater acoustic wireless sensor network. In: Internet Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp. 1005–1011 (2015)

    Google Scholar 

  5. Yuan, C., Chen, W., Zhu, Y., Li, D.: A low computational complexity authentication scheme in underwater wireless sensor network. In: International Conference on Mobile Ad-hoc & Sensor Networks, Shenzhen, China, pp. 116–123 (2015)

    Google Scholar 

  6. Oliveira, L.B., Dahab, R., Lopez, J.: Identity-based encryption for sensor networks. In: The 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, New York, USA (2007)

    Google Scholar 

  7. RSA Homepage. https://en.wikipedia.org/wiki/RSA_(cryptosystem)

  8. Zhang, B., Wang, X.: ECC-based security clustering algorithm for wireless sensor network. J. Lanzhou Jiaotong Univ. 1(35), 20–24 (2016)

    Google Scholar 

  9. Li, F., Zhong, D.: A survey of digital signcryption. Netinfo Secur. 12, 1–8 (2011)

    Google Scholar 

  10. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234

    Chapter  Google Scholar 

  11. Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3/4), 127–137 (2006)

    Article  Google Scholar 

  12. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 1(20), 85–113 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  13. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  14. Yang, M., AI-Anbuky, A., Liu, W.: An identity-based authentication protocol for sensor networks. In: 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1–6. IEEE Press, Salvador (2014)

    Google Scholar 

  15. Wei, R., Zhao, D.: Key-management scheme based on identity and cluster layer for wireless sensor network. Eng. J. Wuhan Univ. 4(48), 580–583 (2015)

    Google Scholar 

  16. Guo, P., Zhang, H., Fu, D., Zhou, M.: Hybrid and lightweight cryptography for WSN. Comput. Sci. 1(39), 69–78 (2012)

    Google Scholar 

  17. Deng, S., Wang, Y.: Grouping and layered key management strategy in WSN based on EBS. Comput. Eng. 9(39), 64–68 (2013)

    Google Scholar 

  18. Sozer, E., Stojanovic, M., Proakis, J.: Underwater acoustic networks. IEEE J. Oceanic Eng. 1(25), 72–83 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenping Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, C., Chen, W., Li, D. (2018). A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network. In: Li, J., et al. Wireless Sensor Networks. CWSN 2017. Communications in Computer and Information Science, vol 812. Springer, Singapore. https://doi.org/10.1007/978-981-10-8123-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8123-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8122-4

  • Online ISBN: 978-981-10-8123-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics