A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

被引:92
|
作者
Shen, Limin [1 ,2 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [3 ]
Wei, Fushan [4 ]
Miao, Meixia [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[4] Zhengzhou Informat Sci & Technol Inst, Dept Informat Res, Zhengzhou 450001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 02期
关键词
Aggregate signature; big data; coalition attack; data aggregation; designated verifier; identity-based (ID-based); unforgeability; wireless sensor network (WSN); BIG DATA; AUTHENTICATION;
D O I
10.1109/JIOT.2016.2557487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model.
引用
收藏
页码:546 / 554
页数:9
相关论文
共 50 条
  • [21] LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
    Li, Zhimin
    Xu, Xin
    Fan, Zexiang
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2012, 5 (04) : 799 - 810
  • [22] Secure vehicular communications based on group signature and ID-based signature scheme
    Sun, Xiaoting
    Lin, Xiaodong
    Ho, Pin-Han
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
  • [23] An ID-based aggregate signature scheme with constant pairing computations
    Shim, Kyung-Ah
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1873 - 1880
  • [24] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [25] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [26] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +
  • [27] Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 318 - +
  • [28] ID-based ring signature scheme secure in the standard model
    Au, Man Ho
    Liu, Joseph K.
    Yuen, Tsz Hon
    Wong, Duncan S.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 1 - 16
  • [29] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [30] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442