Open Access Open Access  Restricted Access Subscription or Fee Access

Surveillance on Data Transmission for Clumping Wireless Sensor Networks Using IBOOS

S. Krishna kumari, B. Muthu Kumar, Aruna Devi


In recent years, the secure data transmission is a complex issue that has been witnessed in the field of Wireless Sensor Networks (WSNs) such as disaster management, conflict field inspection, border protection and security espionage. Sensors in those applications are expected to deploy remotely in an abandoned environments. To support scalability, nodes are often grouped into disjoint and mostly non-overlapping clumps. In this research, a secured data transmission was analyzed for Clump based Wireless Sensor Networks (CWSNs), where the clumps are formed periodically and dynamically. The Secure and Efficient Data Transmission (SET) protocol is proposed for CWSNs, called SET-IBS and SET-IBOOS by using the Identity based Digital Signature (IBS) scheme and the Identity based Online/Offline Digital Signature (IBOOS) scheme respectively. The simulation result shows that the proposed protocol have better performance over the  traditional secure protocols for CWSNs, in terms of security overhead and energy consumption.


Wireless Sensor Networks (WSN); Secure and Efficient Data Transmission-Identity Based Signature (SET-IBS); Secure and Efficient Data Transmission-Identity Based Online/ Offline Signature (SET-IBOOS); Scalability

Full Text:



Joseph K. Liu, JoonsangBaek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong: Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network December 2010.

Sherman S.M. Chow, Joseph K. Liu, Jianying Zhou: Identity-Based Online/Offline Key Encapsulation and Encryption August 2010.

Ameer Ahmed Abbasi, Mohamed Younis: A survey on clustering algorithms for wireless sensor networks June 2007.

FuchunGuo, Yi Mu, Zhide Chen: Identity-Based Online/Offline Encryption January 2008.

YU Yong, NI Jian-Bing, XU Chun-Xiang, NIU Lei: Cryptanalysis of a Secure and Efficient Identity-Based Signature Scheme May 2014.

Kyung-Ah Shim, Young-Ran-Lee, Cheol-Min Park: EIBAS-An efficient Identity-Based Broadcast Authentication Scheme in Wireless Sensor Networks January 2013.

Yinxia Sun, Futai Zhang, LiminShen, Robert Deng: Revocable Identity Based Signature without Pairing September 2013.

A Boldyreva, V Goyal, V Kumar: Identity-based encryption with efficient revocation (2008).

K.G.Paterson: ID-based signatures from pairings on elliptic curves August 2009.

RaylinTso, ChunxiangGu, Takeshi Okamoto, Eiji Okamoto: Efficient ID-Based Digital Signatures with Message Recovery December 2007.

Chen, L., Lee, J. M.: Improved identity-based signcryption (2005).

Horster, P., Michels, M., Petersen, H.: Authenticated encyprtion scheme with low communication costs (1994).

Boneh, D., Boyen, X.: Efficient Selective ID Secure Identity Based Encryption without Random Oracle (2004).

I.F. Akyildiz et al.: Wireless sensor networks: a survey, ComputerNetworks (2002).

C-Y. Chong, S.P. Kumar, Sensor networks: evolution, opportunities, and challenges (2003).

G.J. Pottie, W.J. Kaiser: Wireless integrated network sensors, Communications (2000).

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci: A survey on sensor networks (2002).

J. Baek, H. Tan, J. Zhou, and J. Wong: Realizing stateful public key encryption in wireless sensor network (2008).

X. Chen, F. Zhang, W. Susilo, and Y. Mu: Efficient generic online/offline signatures without key Exposure (2007).

D.W. Carman: “New Directions in Sensor Network Key Management,” Int’l J. Distributed Sensor networks (2005).

B. Muthu Kumar, “Real Time Human Motion Tracking with Image Alignment Optimization using Random Projection” LAP Lambert Academic Publishing, Germany (2016).


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.