Digital signature scheme against internal and external attack for wireless sensor networks

被引:0
|
作者
Yu B.-B. [1 ,2 ]
Hu L. [1 ]
Chi L. [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun
[2] College of Computer Science and Technology, Beihua University, Jilin
关键词
Computer system architecture; Digital signature; Discrete logarithm; Hash function; Wireless sensor network;
D O I
10.13229/j.cnki.jdxbgxb20190301
中图分类号
学科分类号
摘要
This paper puts forward a digital signature based on discrete logarithm and hash function. After security analyzing, the proposal has the resistance to IEAs based on discrete logarithm and hash function. After performance analysis, the memory occupancy of wireless sensor nodes was effectively reduced by the signature scheme presented in this paper. © 2019, Jilin University Press. All right reserved.
引用
收藏
页码:1676 / 1681
页数:5
相关论文
共 11 条
  • [1] Culler D., Estrin D., Srivastava M., Guest editors' introduction: overview of sensor networks, IEEE Computer, 37, 8, pp. 41-49, (2002)
  • [2] Ren F.-Y., Huang H.-N., Lin C., Wireless sensor networks, Journal of Software, 14, 7, pp. 1282-1291, (2003)
  • [3] Lei L.-T., The reseearch of authentication and key exchange mechanism for wireless communication, (2015)
  • [4] Wang H.-Y., Research on key technology of data reliable transimission in wireless sendor networks, (2017)
  • [5] Diffie W., Hellman M.E., New directions in cryptography, IEEE Transactions on Information Theory, 22, 6, pp. 644-654, (1976)
  • [6] He D., Wang D., Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal, 9, 3, pp. 816-823, (2015)
  • [7] Xue K., Ma C., Hong P., Et al., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network and Computer Applications, 36, 1, pp. 316-323, (2013)
  • [8] Lin H.Y., Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21, 8, pp. 2649-2656, (2015)
  • [9] Yu B.-B., Wu X.-Y., Chu J.-F., Et al., Signature protocol for wireless sensor network based on group key agreement, Journal of Jilin University (Engineering and Technology Edition), 47, 3, pp. 924-929, (2017)
  • [10] Ma S., A terminal location verification protocol for collision attack, (2018)