Securable Identity Based Encryption Technique by Generating Key in Wireless Sensor NetworkJournal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.2, No. 1)
Publication Date: 2017-01-04
Authors : S. Sushmitha; V. Devi;
Page : 198-199
Keywords : Data integration; data tampering; bandwidth and storage cost.;
Managing secure and efﬁcient big data aggregation methods are very enticing in the ﬁeld of wireless sensor networks research. In real settings, the wireless sensor networks have been broadly applied, such as objective tracking and environment remote monitoring. In this paper ID-Based Aggregate Signature Scheme in an ID-based cryptography, the user's public key is easily generated from this user's for unique existence information. Combining the highlights of aggregate signature strategy and ID-based cryptography, we give an ID-based aggregate signature. Information can be easily concede by a vast of attacks, such as information interception and data tampering. It mainly focus on data integrity protection by give an identity-based aggregate signature scheme and also generating a key with a designated veriﬁer for wireless sensor networks. The advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce transmission and storage cost for wireless sensor networks.
Other Latest Articles
Last modified: 2017-04-07 16:15:24