ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securable Identity Based Encryption Technique by Generating Key in Wireless Sensor Network

Journal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.2, No. 1)

Publication Date:

Authors : ; ;

Page : 198-199

Keywords : Data integration; data tampering; bandwidth and storage cost.;

Source : Downloadexternal Find it from : Google Scholarexternal


Managing secure and efficient big data aggregation methods are very enticing in the field of wireless sensor networks research. In real settings, the wireless sensor networks have been broadly applied, such as objective tracking and environment remote monitoring. In this paper ID-Based Aggregate Signature Scheme in an ID-based cryptography, the user's public key is easily generated from this user's for unique existence information. Combining the highlights of aggregate signature strategy and ID-based cryptography, we give an ID-based aggregate signature. Information can be easily concede by a vast of attacks, such as information interception and data tampering. It mainly focus on data integrity protection by give an identity-based aggregate signature scheme and also generating a key with a designated verifier for wireless sensor networks. The advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce transmission and storage cost for wireless sensor networks.

Last modified: 2017-04-07 16:15:24