The performance analysis of two digital signature schemes based on secure charging protocol

被引:0
|
作者
Rao, WB [1 ]
Gan, Q [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
关键词
ad-hoc network; secure charging protocol; ECDSA; RSA;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wired equivalent security is difficult to provide in ad-hoc networks due to high dynamics, wireless link vulnerability, and requirement of decentralization. In order to keep up with new networking needs, the secure charging protocol (SCP) aiming at answering the complex authentication, authorization, accounting and charging (AAAC) problem was proposed This protocol employs digital signatures as cryptographic tool to establish authentication, integrity, and non-repudiation of charging information. The question is that devices in ad-hoc networks always have constrained capabilities concerning CPU power, battery power, and transmission bandwidth whereas most digital signature algorithms are resource-consuming. So the optimal choice to a efficient digital signature algorithm is very important. Using a computational measure according to SCP definition, we examine the perfermence of two important digital signature algorithms, ECDSA and RSA, in multihop ad-hoc network environment and find that ECDSA is always the better choice with respect to both data overhead and CPU time.
引用
收藏
页码:1180 / 1182
页数:3
相关论文
共 50 条
  • [1] Secure Aodv Routing Protocol Based on Homomorphic Digital Signature
    Jain, Garima
    Rajawat, Gajendra Singh
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 307 - 311
  • [2] Secure DSR Routing Protocol Based on Homomorphic Digital Signature
    Amir, Mohammad
    Nagar, Dhanroop Mal
    Baghela, Vinay
    [J]. INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [3] Unconditionally secure digital signature schemes admitting transferability
    Hanaoka, G
    Shikata, J
    Zheng, Y
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 130 - 142
  • [4] Two Improved Digital Signature Schemes
    Lin Bogang Dept. of Computer and Technology
    [J]. Journal of Systems Engineering and Electronics, 2001, (01) : 78 - 81
  • [6] Secure signature schemes based on interactive protocols
    Cramer, R
    Damgard, I
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 297 - 310
  • [7] Hash based digital signature schemes
    Dods, C
    Smart, NP
    Stam, M
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 96 - 115
  • [8] Performance study of online batch-based digital signature schemes
    Chou, Cheng-Fu
    Cheng, William C.
    Golubchik, Leana
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (02) : 98 - 114
  • [9] Security Analysis of Two Forward-Secure Threshold Signature Schemes from ICCIS
    Wang, Hong
    Qiu, Gang
    Wei, Shimin
    Zuo, Zepeng
    [J]. 2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 2, 2011, : 174 - 177
  • [10] On the security of two signature schemes for secure communication in IoT environments
    Feihong Xu
    Hui Zeng
    [J]. Multimedia Tools and Applications, 2024, 83 : 43673 - 43683