EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts

نویسندگان

  • Zhong Xu
  • Ruiping Ma
  • Shuai Liu
  • Wenbo He
چکیده

Wireless ad hoc networks are self-configurable and autonomous networks and this type of networks serve as a good candidate to provide communications of many novel applications, including mission critical applications, mobile and pervasive computing, etc. Such networks are often composed of computation-constrained or resource-limited devices and without any underlying infrastructure. On the other hand, the wireless ad hoc networks must be efficient and secure. Recently, several security schemes for the wireless ad hoc networks have been proposed using identity-based signcryption schemes. However, these security schemes either suffer the efficiency problem or have the “key escrow” problem which is the inherent problem of the identity-based cryptography. Besides, most of schemes are based on a single Private Key Generator (PKG), which is not suitable for multi-PKG environment. In this study, we propose an Efficient Identity-based Signcryption scheme based on an online/offline cryptography for Multi-domain ad hoc networks(EISM). The new solution provides required security features and incurs small computational overhead to both the sender and the recipient when compared with the conventional signcryption schemes. Also it solves the “key escrow” problem using the pair-wise symmetric keys communication and is applicable to multi-PKGs environment. We use QualNet to quantify the effectiveness of the proposed scheme under two most popular attacks, redirection attack and rushing attack, both on AODV. We then apply the EISM sincryption scheme in

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-PKG ID based signcryption

Here we propose an identity based signcryption scheme in the multi-PKG environment where sender and receiver receive public key from different PKG. We also define security models for our scheme and give security proofs in random oracle model.

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

Multi-Recipient Signcryption for Secure Wireless Group Communication

Secure group communication is significant for wireless and mobile computing. Overheads can be reduced efficiently when a sender sends multiple messages to multiple recipients using multi-recipient signcryption schemes. In this paper, we proposed the formal definition and security model of multirecipient signcryption, presented the definition of reproducible signcryption and proposed security th...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ad Hoc & Sensor Wireless Networks

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2011