To The Encrypted Sensed Data By Applying Digital Signatures To Message Packets Using SET-IBS and SET-IBOOS

M vamsi Krishna, P Vanimanikyam


We recommend two protected and resourceful data Transmission(SET) protocols for CWSNs, called SET-IBS and SETIBOOS,by means of the IBS scheme and the IBOOS scheme, correspondingly. The key suggestion of both SET-IBS and SET-IBOOS is to confirm the encrypted sensed data, by be valid digital signatures to message packets, which are capable in communication and applying the key supervision for security. In the proposed protocols, secret keys and pairing parameters are scattered and preloaded in all sensor nodes by the BS at first, which overcomes the key escrow difficulty explain in ID-based crypto-systems. Cluster-based data transmission in WSNs has been examined by researchers in order to attain the network scalability and management, which make the most of node life and decrease bandwidth use by using local collaboration in the middle of sensor nodes.


Cluster-based WSNs, ID-based digital signature, ID-based online/offline digital signature, secure data transmission protocol.


T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor NetworkTechnologies for the Information Explosion Era, Stud. Comput. Intell.Springer-Verlag, 2010, vol. 278.

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issuesin Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8,no. 2, pp. 2–23, 2006.

A. A. Abbasi and M. Younis, “A survey on clustering algorithms forwireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp.2826–2841, 2007.

W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “AnApplication-Specific Protocol Architecture for Wireless MicrosensorNetworks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,2002.

A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Modelfor Information Retrieval in Wireless Sensor Networks Using EnhancedAPTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp.1290–1302, 2002.

S. Yi, J. Heo, Y. Cho et al., “PEACH: Power-efficient and adaptiveclustering hierarchy protocol for wireless sensor networks,” Comput.Commun., vol. 30, no. 14-15, pp. 2842–2852, 2007.

K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and ImplementationIssues of Clustering in Wireless Sensor Networks,” Int. J. Comput.Applications, vol. 47, no. 11, pp. 23–28, 2012.

L. B. Oliveira, A. Ferreira, M. A. Vilac¸aet al., “SecLEACH-On thesecurity of clustered sensor networks,” Signal Process., vol. 87, pp.2882–2895, 2007.

P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performanceanalysis of a secure clustering protocol for sensor networks,” in Proc.IEEE NCA, 2007, pp. 145–152.

K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol forCluster-Based Wireless Sensor Networks Using Group Key Management,”in Proc. WiCOM, 2008, pp. 1–5.

S. Sharma and S. K. Jena, “A Survey on Secure Hierarchical RoutingProtocols in Wireless Sensor Networks,” in Proc. ICCCS, 2011, pp.146–151.

G. Gaubatz, J. P. Kaps, E. Ozturket al., “State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks,”in Proc. IEEE PerCom Workshops, 2005, pp. 146–150.

W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEETrans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976.

A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” inLect. Notes. Comput. Sc. - CRYPTO, 1985, vol. 196, pp. 47–53.

D. W. Carman, “New Directions in Sensor Network Key Management,”Int. J. Distrib. Sens. Netw., vol. 1, pp. 3–15, 2005

Full Text: PDF [FULL TEXT]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at