Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network

نویسنده

  • Jayaprakash Kar
چکیده

This paper describes an efficient and secure online and offline signature scheme for wireless sensor network (WSN). Security of the proposed scheme is based on difficulty of breaking Bilinear Diffie-Hellman problem (BDHP). WSN systems are usually deployed in hostile environments where they encounter a wide variety of malicious attacks. Information that is the cooked data collected within the sensor network, is valuable and should be kept confidential. In order to protect this transmitted information or messages between any two adjacent sensor nodes, a mutual authentication and key establishment protocol is required for wireless sensor networks. Because some inherent restrictions of sensor nodes which include low power, less storage space, low computation ability and short communication range most existing protocols attempt to establish a pairwise key between any two adjacent sensor nodes by adopting a key pre-distribution approach. In order to further reduce the computational cost of signature generation, online/off-line is suitable for WSN. In on-line/off-line signature scheme, the signing process can be broken into two phases. The first phase, performed off-line, is independent of the particular message to be signed; while the second phase is performed on-line, once the message is presented. BDHP, bilinear pairing, multi-signature, online/off-line identity-based signature scheme

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multi-Hop Data Transmission Over Cluster Based Wireless Sensor Network

In Wireless Sensor Networks (WSNs), secure data transmission is the major problem. LEACH protocols are used in wireless sensor networks which cause orphan node problem based on Security and require high Energy Consumption. Clustering technique is an effective way to enhance the system performance of wireless sensor networks. To address this problem Propose Secure and Efficient data Transmission...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue

Partially blind signature schemes are the most important ingredient for anonymity in off-line e-cash system. In this paper, a new approach to setup formal security arguments in random oracle model for factorization based partially blind signature schemes is presented. Then a provably secure and efficient scheme based on quadratic residue is proposed. The approach also allows one to give formal ...

متن کامل

An Improved Online/Offline Identity-Based Signature Scheme for WSNs

Online/offline signature schemes allow the signer to generate an online signature in real-time from a precomputed offline signature when presented with a document. Such schemes are particularly useful in resource-constrained wireless sensor network applications. In this paper, we describe an identity-based online/offline signature scheme based on bilinear maps, and prove the security of the sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2012