International Journal of Information Security

, Volume 9, Issue 4, pp 287–296 | Cite as

Efficient online/offline identity-based signature for wireless sensor network

  • Joseph K. Liu
  • Joonsang Baek
  • Jianying Zhou
  • Yanjiang Yang
  • Jun Wen Wong
Regular Contribution

Abstract

In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSN environment with severely constrained resources. One of the interesting features of our scheme is that it provides multi-time usage of the offline storage, which allows the signer to re-use the offline pre-computed information in polynomial time, in contrast to one-time usage in all previous online/offline signature schemes. As evidence of the practicality and feasibility of our scheme to be used in the WSN environment, we provide an actual implementation result of our scheme on the MicaZ platform.

Keywords

Wireless sensor network security Id-based signature Security for resource-constrained devices 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
  2. 2.
    Baek, J., Tan, H., Zhou, J., Wong J.: Realizing stateful public key encryption in wireless sensor network. In: Proc. IFIP-SEC ’08, pp. 95–108. Springer, Boston (2008)Google Scholar
  3. 3.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Proc. EUROCRYPT ’04, vol. 3027. Lecture Notes in Computer Science, pp. 268–286. Springer, New York (2004)Google Scholar
  4. 4.
    Boneh D., Boyen X.: Short signatures without random oracles the SDH assumption in bilinear groups. J. Cryptol. 2, 149–177 (2008)CrossRefMathSciNetGoogle Scholar
  5. 5.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proc. CRYPTO 2001, vol. 2139. Lecture Notes in Computer Science, pp. 213–229. Springer, Berlin (2001)Google Scholar
  6. 6.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Proc. ASIACRYPT ’01, vol. 2248. Lecture Notes in Computer Science, pp. 514–532. Springer, New York (2001)Google Scholar
  7. 7.
    Cha, J., Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Proc. PKC’2003, vol. 2567. Lecture Notes in Computer Science, pp. 18–30. Springer, Berlin (2003)Google Scholar
  8. 8.
    Chen, X., Zhang F., Susilo W., Mu, Y.: Efficient generic online/offline signatures without key exposure. In: Proc. ACNS ’07, vol. 4521. Lecture Notes in Computer Science, pp. 18–30. Springer, Berlin (2007)Google Scholar
  9. 9.
    Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. In: Proc. CRYPTO ’89, vol. 2442. Lecture Notes in Computer Science, pp. 263–277. Springer, New York (1989)Google Scholar
  10. 10.
    Gaubatz, G., Kaps, J.-P., Oztruk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. PerSec ’05, pp. 146–150. IEEE (2005)Google Scholar
  11. 11.
    Guillou, L.C., Quisquater, J.-J.: A “Paradoxical” Identity-based signature scheme resulting from zero-knowledge. In: Proc. CRYPTO 88, vol. 403. Lecture Notes in Computer Science, pp. 216–231. Springer, Berlin (1989)Google Scholar
  12. 12.
    Hess, F.: Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002, vol. 2595. Lecture Notes in Computer Science, pp. 310–324. Springer, Berlin (2003)Google Scholar
  13. 13.
    Joye, M.: An efficient on-line/off-line signature scheme without random oracles. In: Proc. CANS ’08, vol. 5339. Lecture Notes in Computer Science, pp. 98–107. Springer, Berlin (2008)Google Scholar
  14. 14.
    Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. ACM SenSys~’04, pp. 162–175. ACM, Baltimore (2004)Google Scholar
  15. 15.
    Kurosawa, K., Schmidt-Samoa, K.: New online/offline signature schemes without random oracles. In: Proc. PKC ’06, vol. 3958. Lecture Notes in Computer Science, pp. 330–346. Springer, Berlin (2006)Google Scholar
  16. 16.
    Liu, A., Ning, P.: TinyECC—A configurable library for elliptic curve cryptography in wireless sensor networks (Version 1.0). Cyber Defense Laboratory, NCSU. http://discovery.csc.ncsu.edu/software/TinyECC/ (2007)
  17. 17.
    Li, F., Shirase, M., Takagi, T.: On the security of online/offline signatures and multisignatures from acisp’06. In: Proc. CANS ’08, vol. 5339. Lecture Notes in Computer Science, pp. 108–119. Springer, Berlin 2008Google Scholar
  18. 18.
    Lopez J., Zhou J.: Wireless sensor network security, vol. 1. Cryptology and Information Security Series. IOS Press, Amsterdam (2008)Google Scholar
  19. 19.
    Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Cryptology ePrint Archive, Report 2007/482. http://eprint.iacr.org/ (2007)
  20. 20.
    Perrig A., Stankovic J., Wagner D.: Security in wireless sensor networks. Commun ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  21. 21.
    Roma, R., Alcaraz, C.: Applicability of public key infrastructures in wireless sensor networks. In: Proc. EuroPKI ’07, vol. 4582. Lecture Notes in Computer Science, pp. 313–320. Springer, Berlin (2007)Google Scholar
  22. 22.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO ’84, vol. 196. Lecture Notes in Computer Science, pp. 47–53. Springer, Berlin (1984)Google Scholar
  23. 23.
    Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Proc. CRYPTO ’01, vol. 2139. Lecture Notes in Computer Science, pp. 355–367. Springer, Berlin (2001)Google Scholar
  24. 24.
    SMEPP. Secure middleware for embedded P2P systems, 2006 to present. http://www.smepp.org
  25. 25.
    Tan, C., Wang, H., Zhong, S., Li, Q.: Body sensor network security: An identity-based cryptography approach. In: Proc. 1st ACM conference on Wireless Network Security, pp. 148–153. ACM, Virginia (2008)Google Scholar
  26. 26.
    Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proc. PerCom ’05, pp. 324–328. IEEE Computer Society, New York (2005)Google Scholar
  27. 27.
    Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: Proc. 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59–64. ACM, Washington, DC (2004)Google Scholar
  28. 28.
    Xu, S., Mu, Y., Susilo W.: Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proc. ACISP ’06, vol. 4058. Lecture Notes in Computer Science, pp. 99–110. Springer, Berlin (2006)Google Scholar

Copyright information

© Springer-Verlag 2010

Authors and Affiliations

  • Joseph K. Liu
    • 1
  • Joonsang Baek
    • 1
  • Jianying Zhou
    • 1
  • Yanjiang Yang
    • 1
  • Jun Wen Wong
    • 1
  1. 1.Institute for Infocomm ResearchSingaporeSingapore

Personalised recommendations