A Pseudonym-based Signature Scheme for Dynamic Clusters in Ad Hoc Networks

被引:0
|
作者
Zhang, Yang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Anonymity; Pseudonym System; Digital Signature Scheme; Ad Hoc Network; ANONYMOUS CREDENTIALS; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in ad hoc networks often self-organize into clusters in which a node need anonymously prove the membership in some scenarios. For a self-organized cluster, any node should have the capacity to act as the cluster manger and use varying pseudonyms to keep privacy while the procedure of reissuing key is not desirable. Dynamic group signature schemes provide a probable solution, but are inappropriate because no incorruptible online TA (Trusted Authority) exists to run a group-key generation algorithm in the corruptible clusters of an ad hoc network, the opening capability are not absolutely necessary for a temporary cluster, and how to generate pseudonyms are not specified. To resolve the above problem, this paper proposes a pseudonym-based signature scheme where pseudonyms can be self-generated and messages can be bound to the self-generated pseudonyms. After the TA offline issues keys to all nodes, cluster managers can be dynamically elected and compute the public cluster-keys, which allow a node to dynamically join or leave the cluster by updating its restriction pseudonym. Then, only cluster members can sign messages on behalf of the cluster. Because the pseudonyms are self-updated and not directly bound to certificates, the signature scheme based on them must satisfy some new requirements. Hence, we formalize a security model for pseudonym-based signature schemes. The security of our scheme is proved in the random oracle model.
引用
收藏
页码:208 / 215
页数:8
相关论文
共 50 条
  • [1] Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks
    Wang, Chang-Ji
    Shi, Dong-Yuan
    Xu, Xi-Lei
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 253 - 260
  • [2] A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan H.
    SENSORS, 2022, 22 (05)
  • [3] Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android
    Oliveira, Leonardo
    Sucasas, Victor
    Mantas, Georgios
    Rodriguez, Jonathan
    COGNITIVE RADIO ORIENTED WIRELESS NETWORKS, 2018, 228 : 75 - 87
  • [4] Group signature scheme for vehicular Ad Hoc networks based on blockchain
    Wu Y.-L.
    Zhu Z.-Q.
    Huang M.-B.
    Zhao X.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (05): : 1161 - 1167
  • [5] A new collision-free pseudonym scheme in mobile ad hoc networks
    Yoon, Ji Won
    Kim, Hyoungshick
    2009 7TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS, 2009, : 376 - +
  • [6] An altitude based dynamic routing scheme for ad hoc networks
    Cheng, Rei-Heng
    Wu, Tung-Kuang
    Yu, Chang Wit
    Kuo, Chun-Hung
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 609 - 619
  • [7] Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives
    Zhang, Junsong
    He, Lei
    Zhang, Qikun
    Gan, Yong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (11): : 5654 - 5673
  • [8] PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks
    Foerster, David
    Kargl, Frank
    Loehr, Hans
    AD HOC NETWORKS, 2016, 37 : 122 - 132
  • [9] Towards an Efficient Pseudonym Management and Changing Scheme for Vehicular Ad-Hoc Networks
    Boualouache, Abdelwahab
    Senouci, Sidi-Mohammed
    Moussaoui, Samira
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [10] Pseudonym generation scheme for ad-hoc group communication based on IDH
    Manulis, M
    Schwenk, J
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 107 - 124