Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ SSRN Electronic Jour...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
SSRN Electronic Journal
Article
License: CC BY
Data sources: UnpayWall
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
International Journal of Wireless & Mobile Networks
Article . 2017 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2017
License: CC BY
Data sources: ZENODO
SSRN Electronic Journal
Article . 2017 . Peer-reviewed
Data sources: Crossref
https://dx.doi.org/10.60692/0j...
Other literature type . 2017
Data sources: Datacite
https://dx.doi.org/10.60692/s9...
Other literature type . 2017
Data sources: Datacite
versions View all 5 versions
addClaim

Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network

نظام تشفير NTRU قائم على نظام معتمد لشبكة UWB - IR المخصصة
Authors: Jamel Miri; Bechir Nsiri; Ridha Bouallègue;

Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network

Abstract

Du monde du radar et de la recherche militaire, la radio impulsionnelle à bande ultra large (UWB-IR) a été adoptée dans le monde des télécommunications dans les années 1990'. Actuellement, la technologie UWB-IR est un candidat intéressant pour les réseaux de capteurs sans fil (WSN) à courte portée. Il est particulièrement attrayant pour les réseaux de capteurs industriels en raison de sa résilience aux interférences multivoies, de ses circuits d'émetteur-récepteur simples, de sa capacité de télémétrie précise et de sa faible puissance d'émission. Afin de sécuriser les données et les communications dans les réseaux UWB-IR ad hoc, UWB-IR nécessite des protocoles de cryptage appropriés. Dans cet article, nous examinons et résumons le protocole de sous-couche de sécurité IEEE 802.15.4 du schéma de cryptographie à clé symétrique basé sur UWB-IR. Ensuite, nous mettons en évidence les différentes vulnérabilités et faiblesses présentes dans ce type de schéma. Enfin, nous prouvons, après un examen approfondi de plusieurs schémas de cryptographie à clé publique (PKC), que le sans certificat est le plus approprié pour les réseaux UWB-IR ad hoc caractérisés par une mobilité des nœuds. En effet, nous avons également évalué et analysé les différents cryptosystèmes à clé publique (PKCS) et conclu que NTRU est le cryptosystème à clé publique le plus optimal à utiliser avec le schéma sans certificat afin de sécuriser les données et les communications dans les réseaux UWB-IR ad hoc. Cela est dû au fait qu'il s'agit du PKCS le plus rapide à fournir différents niveaux de sécurité à grande vitesse avec des ressources très limitées.

Desde el mundo del radar y la investigación militar, la Radio de Impulso de Banda Ultra Ancha (UWB-IR) se adoptó en el mundo de las telecomunicaciones en la década de 1990'. Actualmente, la tecnología UWB-IR es un candidato interesante para las redes de sensores inalámbricos de corto alcance (WSN). Es particularmente atractivo para redes de sensores industriales debido a su resistencia a la interferencia multitrayecto, circuitos transceptores simples, capacidad de alcance preciso y baja potencia de transmisión. Para proteger los datos y las comunicaciones en las redes UWB-IR Ad-Hoc, UWB-IR requiere protocolos de cifrado adecuados. En este documento, revisamos y resumimos el protocolo de subcapa de seguridad IEEE 802.15.4 del esquema de criptografía de clave simétrica basado en UWB-IR. A continuación, destacamos las diferentes vulnerabilidades y debilidades presentes en este tipo de esquemas. Finalmente, demostramos, después de un examen profundo de múltiples esquemas de Criptografía de Clave Pública (PKC), que el sin certificado es el más adecuado para redes UWB-IR Ad-Hoc caracterizadas por la movilidad de nodos. De hecho, también hemos evaluado y analizado los diferentes criptosistemas de clave pública (PKCS) y concluimos que NTRU es el criptosistema de clave pública más óptimo que se utilizará con el esquema sin certificado para proteger los datos y las comunicaciones en redes UWB-IR ad hoc. Esto se debe al hecho de que es el PKCS más rápido para proporcionar diferentes niveles de seguridad a alta velocidad con recursos muy limitados.

From the radar and military research world's, the Ultra-WideBand Impulse Radio (UWB-IR) was adopted in the telecommunications world in the 1990'. Currently, the UWB-IR technology is an interesting candidate for close range Wireless Sensors Networks (WSNs). It is particularly attractive for industrial sensor networks due to its resilience to multipath interference, simple transceiver circuitry, accurate ranging ability, and low transmission power. In order to secure data and communications in the Ad-Hoc UWB-IR networks, UWB-IR requires suitable encryption protocols. In this paper, we review and summarize the IEEE 802.15.4 security sub-layer protocol of UWB-IR based Symmetric Key Cryptography scheme. Then, we highlight the different vulnerabilities and weaknesses present in this type of scheme. Finally, we prove, after a deep examination of multiple Public Key Cryptography (PKC) schemes, that the certificateless one is the most suitable for Ad-Hoc UWB-IR networks characterized by nodes mobility. Indeed, we have also evaluated and analyzed the different public key cryptosystems (PKCS) and concluded that NTRU is the most optimum public key cryptosystem to be used with the certificateless scheme in order to secure data and communications in Ad-Hoc UWB-IR Networks. This is due to the fact that it is the fastest PKCS to provide different security levels at a high speed with very constrained resources.

من عالم الرادار والبحوث العسكرية، تم اعتماد راديو الاندفاع عريض النطاق (UWB - IR) في عالم الاتصالات السلكية واللاسلكية في عام 1990. في الوقت الحالي، تعد تقنية UWB - IR مرشحًا مثيرًا للاهتمام لشبكات المستشعرات اللاسلكية القريبة المدى (WSNs). إنه جذاب بشكل خاص لشبكات المستشعرات الصناعية بسبب مرونته للتداخل متعدد المسارات، ودوائر الإرسال والاستقبال البسيطة، وقدرة تحديد المدى الدقيقة، وقوة الإرسال المنخفضة. من أجل تأمين البيانات والاتصالات في شبكات UWB - IR المخصصة، تتطلب UWB - IR بروتوكولات تشفير مناسبة. في هذه الورقة، نقوم بمراجعة وتلخيص بروتوكول الطبقة الفرعية الأمنية IEEE 802.15.4 لنظام تشفير المفتاح المتماثل القائم على UWB - IR. ثم نسلط الضوء على نقاط الضعف والضعف المختلفة الموجودة في هذا النوع من المخطط. أخيرًا، نثبت، بعد فحص عميق لمخططات تشفير المفتاح العام المتعددة (PKC)، أن المخطط غير المعتمد هو الأنسب لشبكات UWB - IR المخصصة التي تتميز بتنقل العقد. في الواقع، قمنا أيضًا بتقييم وتحليل أنظمة تشفير المفاتيح العامة المختلفة (PKCS) وخلصنا إلى أن NTRU هو أفضل نظام تشفير للمفتاح العام ليتم استخدامه مع المخطط غير المعتمد من أجل تأمين البيانات والاتصالات في شبكات UWB - IR المخصصة. ويرجع ذلك إلى حقيقة أنها أسرع PKCS لتوفير مستويات أمنية مختلفة بسرعة عالية مع موارد مقيدة للغاية.

Keywords

Ad-Hoc Networks, Ultra-Wideband Communications Technology and Applications, Computer Networks and Communications, Encryption, Public key cryptosystems, Mathematical analysis, Engineering, Cryptanalysis of Block Ciphers and Hash Functions, Artificial Intelligence, UWB Systems, FOS: Electrical engineering, electronic engineering, information engineering, Ultra-Wideband, FOS: Mathematics, Electrical and Electronic Engineering, Cryptosystem, Scheme (mathematics), Computer network, Network packet, NTRU, UltraWideBand Impulse Radio., Secure Routing, Wireless ad hoc network, Hybrid cryptosystem, Computer science, Mobile ad hoc network, Physical Sciences, Computer Science, Wireless, Telecommunications, Public key cryptography, Security in Wireless Sensor Networks, Certificateless, Mathematics

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    2
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 3
    download downloads 8
  • 3
    views
    8
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
2
Average
Average
Average
3
8
Green
gold