A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

被引:92
|
作者
Shen, Limin [1 ,2 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [3 ]
Wei, Fushan [4 ]
Miao, Meixia [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[4] Zhengzhou Informat Sci & Technol Inst, Dept Informat Res, Zhengzhou 450001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 02期
关键词
Aggregate signature; big data; coalition attack; data aggregation; designated verifier; identity-based (ID-based); unforgeability; wireless sensor network (WSN); BIG DATA; AUTHENTICATION;
D O I
10.1109/JIOT.2016.2557487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model.
引用
收藏
页码:546 / 554
页数:9
相关论文
共 50 条
  • [41] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [42] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    Journal of Electronics(China), 2008, (02) : 226 - 231
  • [43] Efficient ID-Based Signature Scheme from Bilinear Map
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306
  • [44] An efficient ID-based bilinear key predistribution scheme for distributed sensor networks
    Dai, Tran Thanh
    Hieu, Cao Trong
    Hong, Choong Seon
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 260 - 269
  • [45] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [46] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [47] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420
  • [48] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [49] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [50] Efficient and secure user identification scheme based on ID-based cryptosystem
    Kim, Kee-Won
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    INTERNATIONAL E-CONFERENCE ON COMPUTER SCIENCE 2005, 2005, 2 : 79 - 82