Efficient online/offline identity-based signature for wireless sensor network

被引:100
|
作者
Liu, Joseph K. [1 ]
Baek, Joonsang [1 ]
Zhou, Jianying [1 ]
Yang, Yanjiang [1 ]
Wong, Jun Wen [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
关键词
Wireless sensor network security; Id-based signature; Security for resource-constrained devices; SECURITY; MULTISIGNATURES;
D O I
10.1007/s10207-010-0109-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSN environment with severely constrained resources. One of the interesting features of our scheme is that it provides multi-time usage of the offline storage, which allows the signer to re-use the offline pre-computed information in polynomial time, in contrast to one-time usage in all previous online/offline signature schemes. As evidence of the practicality and feasibility of our scheme to be used in the WSN environment, we provide an actual implementation result of our scheme on the MicaZ platform.
引用
收藏
页码:287 / 296
页数:10
相关论文
共 50 条
  • [21] Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network
    LI Wen-ji
    ZHENG Kang-feng
    ZHANG Dong-mei
    YE-Qing
    YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2013, (04) : 80 - 86
  • [22] IBKES: Efficient Identity-Based Key Exchange with Scalability for Wireless Sensor Networks Using Algebraic Signature
    Wan, Changsheng
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 39 (1-4) : 215 - 237
  • [23] A Wireless Mesh network Secure Access method based on Identity-based Signature
    Wang, Ze
    Xing, Yajuan
    Wang, Qi
    Liu, Wenju
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [24] A Generic Construction of Identity-Based Online/Offline Signcryption
    Sun, Dongdong
    Mu, Yi
    Susilo, Willy
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 707 - 712
  • [25] An Anonymous Multireceiver with Online/Offline Identity-Based Encryption
    Wang, Qihua
    Li, Fagen
    Wang, Huaqun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [26] An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature
    Baek, Joonsang
    Byon, Young-ji
    Hableel, Eman
    Al-Qutayri, Mahmoud
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 358 - 363
  • [27] Novel efficient identity-based signature on lattices
    Chen, Jiang-shan
    Hu, Yu-pu
    Liang, Hong-mei
    Gao, Wen
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (02) : 244 - 250
  • [28] New Efficient Hierarchical Identity-based Signature
    Wu, Qing
    Zhang, Leyou
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 803 - 810
  • [29] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [30] A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network
    Yuan, Chi
    Chen, Wenping
    Li, Deying
    WIRELESS SENSOR NETWORKS (CWSN 2017), 2018, 812 : 44 - 54