A survey of public-key cryptographic primitives in wireless sensor networks

KA Shim - IEEE Communications Surveys & Tutorials, 2015‏ - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …

Key-aggregate cryptosystem for scalable data sharing in cloud storage

CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013‏ - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …

Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage

B Cui, Z Liu, L Wang - IEEE Transactions on computers, 2015‏ - ieeexplore.ieee.org
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …

Vampire attacks: Draining life from wireless ad hoc sensor networks

EY Vasserman, N Hopper - IEEE transactions on mobile …, 2011‏ - ieeexplore.ieee.org
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

LB Oliveira, DF Aranha, CPL Gouvêa, M Scott… - Computer …, 2011‏ - Elsevier
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …

Verifiable searchable encryption with aggregate keys for data sharing system

Z Liu, T Li, P Li, C Jia, J Li - Future Generation Computer Systems, 2018‏ - Elsevier
In a secure data sharing system, the keyword search over encrypted files is a basic need of
a user with appropriate privileges. Although the traditional searchable encryption technique …

A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems

A Ara, M Al-Rodhaan, Y Tian, A Al-Dhelaan - IEEE access, 2017‏ - ieeexplore.ieee.org
Due to advancements in the development of wireless medical sensing devices and wireless
communication technologies, the wireless body area network (WBAN) has become an …

[کتاب][B] RFID and sensor networks: architectures, protocols, security, and integrations

Y Zhang, LT Yang, J Chen - 2009‏ - books.google.com
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …

EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

KA Shim, YR Lee, CM Park - Ad Hoc Networks, 2013‏ - Elsevier
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …

Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks

X **ong, DS Wong, X Deng - 2010 IEEE Wireless …, 2010‏ - ieeexplore.ieee.org
Computing Bilinear Pairing on sensor platforms has become an important research topic
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …