Abstract- Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide variety of malicious attacks. As various applications of WSN have been proposed, security has become one of the big research challenges dan is receiving increasing attention. In order to insure the security of communication in wireless sensor networks, we proposed a new ID-based signcryption scheme using bilinear pairing. Under the computational Diffie-Hellman assumption, the security of the scheme is proved under the Random Oracle Model. This scheme can be used by the sensor nodes that with low power, less storage space and low computation ability. It is concluded that the proposed lightweight scheme satisfies the security requirement...
An important objective of cryptographic schemes is to withstand various attacks, including leakage a...
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the sche...
Authentication is an important aspect for security in any cryptographic application. For Wireless Se...
Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide var...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
Abstract – A secure channel between a sensor node and internet host is created, hence new security c...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
With the development of the wireless communication technology and the sensor technology, the wireles...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled ...
With the growing usage of wireless sensors in a variety of applications including Internet of Things...
Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years an...
ABSTRACT: Novel advance in wireless communications and electronics have led to the development of lo...
An important objective of cryptographic schemes is to withstand various attacks, including leakage a...
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the sche...
Authentication is an important aspect for security in any cryptographic application. For Wireless Se...
Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide var...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
Abstract – A secure channel between a sensor node and internet host is created, hence new security c...
This paper describes an efficient and secure online and off-line signature scheme for wireless senso...
[[abstract]]To make wireless sensor network more suitable in practical use, researchers have to deve...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
With the development of the wireless communication technology and the sensor technology, the wireles...
[[abstract]]Abstract. Wireless sensor networks (WSNs) have gained much attention due to large number...
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled ...
With the growing usage of wireless sensors in a variety of applications including Internet of Things...
Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years an...
ABSTRACT: Novel advance in wireless communications and electronics have led to the development of lo...
An important objective of cryptographic schemes is to withstand various attacks, including leakage a...
The security of cryptographic schemes is proven secure by reducing an attacker which breaks the sche...
Authentication is an important aspect for security in any cryptographic application. For Wireless Se...