Please use this identifier to cite or link to this item:
https://repository.seku.ac.ke/handle/123456789/5147Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Omala, Anyembe A. | - |
| dc.contributor.author | Ali, Ikram | - |
| dc.contributor.author | Li, Fagen | - |
| dc.date.accessioned | 2019-10-25T11:15:24Z | - |
| dc.date.available | 2019-10-25T11:15:24Z | - |
| dc.date.issued | 2018-06-27 | - |
| dc.identifier.citation | Security and Privacy, Volume 1 Issue 5 Pages e25 | en_US |
| dc.identifier.issn | 2475-6725 | - |
| dc.identifier.uri | https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.25 | - |
| dc.identifier.uri | http://repository.seku.ac.ke/handle/123456789/5147 | - |
| dc.description | DOI: 10.1002/spy2.25 | en_US |
| dc.description.sponsorship | Wireless body area network (WBAN) is composed of sensors that capture and transmit physiological data to an application provider's (AP) remote server. When integrated into the Internet of Things (IoT) infrastructure, WBAN data can be accessed from anywhere and at anytime. A secure storage and access mechanism to this sensitive data is necessary within a heterogeneous IoT. Searchable encryption (SE) provides secure method that could be used by an AP for example, hospital employees to securely access a patient's medical record. This is achieved by sending a trapdoor function to remote server. In this paper, we propose a new SE technique based on a signcrypted keyword and a designated tester. It is constructed from Li et al.'s practical signcryption scheme. In the proposed scheme, a data owner (WBAN) operates in certificateless cryptography, while a designated tester (server) and a receiver are both in public key infrastructure environment. We use both authenticity and confidentiality property of a signcryption scheme to proof that our scheme is provably secure against keyword guessing attack. A quantitative analysis on performance against other certificateless SE schemes shows that our scheme is computationally lightweight during keyword‐ciphertext and trapdoor generation. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Wiley-Blackwell | en_US |
| dc.subject | certificateless | en_US |
| dc.subject | Internet of Things | en_US |
| dc.subject | keyword | en_US |
| dc.subject | random oracle | en_US |
| dc.subject | signcryption | en_US |
| dc.subject | WBAN | en_US |
| dc.title | Heterogeneous signcryption with keyword search for wireless body area network | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | School of Science and Computing (JA) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Omala_Heterogeneous signcryption with keyword....pdf | Abstract | 111.17 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
