Securing and Transmitting Quantum Data on Wireless Sensor Network
G. Subhashini1, V. Neelambary2
1G. Subhashini, Assistant Professor, Department of Information Technology, St. Joseph’s Institute of Technology, Chennai (Tamil Nadu), India.
2V. Neelambary, Assistant Professor, Department of Information Technology, St. Joseph’s Institute of Technology, Chennai (Tamil Nadu), India.
Manuscript received on 15 December 2018 | Revised Manuscript received on 27 December 2018 | Manuscript Published on 24 January 2019 | PP: 324-328 | Volume-7 Issue-4S2 December 2018 | Retrieval Number: Es2071017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Signcryption is a cryptographic technique for simultaneously performing both digital signature and data encryption. It is an effective technique for protecting the confidentiality and unforgeability of communications in Internet of Things (IoT) systems, especially when a number of generated cipher texts can be aggregated into a compact form. This paper focus on device capture attacks those are commonly threatening the implementations of signcryption on unattended devices by enabling an attacker to extract the cryptographic key from a captured device. The proposed obfuscator can protect signcryption programs from key-extraction attacks by transforming the programs into unintelligible obfuscated programs. The scheme’s security features with respect to obfuscation, confidentiality, and unforgeability have been theoretically proved. Moreover, in comparison with other (nonobfuscatable) aggregate signcryption schemes, the scheme’s computational efficiency is positioned at a medium level while the communication cost is also relatively small, with extra unique security features benefiting from obfuscation. Experiments on different devices indicated that the proposed scheme performs reasonably well as expected. The scheme is widely applicable for various scenarios of IoT, where information is sent from unattended leaf nodes to a sink point.
Keywords: Signcryption; Internet of Things (IoT); Aggregate Signcryption; Sink Point.
Scope of the Article: Wireless ad hoc & Sensor Networks