Advertisement

Wireless Personal Communications

, Volume 97, Issue 1, pp 1185–1196 | Cite as

PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks

  • Gaurav Sharma
  • Suman Bala
  • Anil K. Verma
Article
  • 103 Downloads

Abstract

Authentication is an important aspect for security in any cryptographic application. For Wireless Sensor Networks (WSN), authentication of a message is a vital concern. Authentication is provided through digital signature, and the cost of signing a message is a crucial factor due to the resource constraint nature of a sensor mote. So, there is a need to optimize the cost of computations, involved in the digital signature. In this paper, we present a Pairing-Free Identity Based digital Signature (PF-IBS) algorithm for WSN. PF-IBS is proven secure in terms of existential UnForgeability in the random oracle model against Adaptive Chosen Message Attack (UF-PF-IBS-ACMA). For the performance evaluation of the PF-IBS algorithm, the experimental setup includes MICAz sensor mote with TinyOS and RELIC-Toolkit cryptographic library. The results are gathered with the help of an emulator AVRORA.

Keywords

WSN Identity-based signature Authentication Pairing-free 

References

  1. 1.
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRefGoogle Scholar
  2. 2.
    Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. Security in distributed: Grid, and pervasive computing. Boca Raton: CRC Press.Google Scholar
  3. 3.
    Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRefGoogle Scholar
  4. 4.
    Olariu, S. (2005). Information assurance in wireless sensor networks. In Proceedings of the 19th IEEE international conference on parallel and distributed processing symposium.Google Scholar
  5. 5.
    Chen, Y., & Zhao, Q. (2005). On the lifetime of wireless sensor networks. IEEE Communications Letters, 9(11), 976–978.CrossRefGoogle Scholar
  6. 6.
    Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84 on advances in cryptology (pp. 47–53).Google Scholar
  7. 7.
    Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of 3rd IEEE international conference on pervasive computing and communications.Google Scholar
  8. 8.
    Guillou, L. C., & Quisquater, J. (1989). A paradoxical identity-based signature scheme resulting from zero-knowledge. In Proceedings of CRYPTO 88, LNCS, 403: 216231. Springer, Berlin.Google Scholar
  9. 9.
    Yi, X. (2003). An identity-based signature scheme from the Weil Pairing. IEEE Communications Letters, 7(2), 67–69.CrossRefGoogle Scholar
  10. 10.
    Cha, J., & Cheon, J. (2003). An identity-based signature from gap Diffie–Hellman groups, PKC-2003. LNCS, 2567, 1830.Google Scholar
  11. 11.
    Hess, F. (2003). Efficient identity based signature schemes based on pairings. In Nyberg, K., & Heys, H. M. (Eds.) SAC-2002, LNCS (Vol. 2595, pp. 310−324). Heidelberg: Springer.Google Scholar
  12. 12.
    Bellare, M., Namprempre, C., & Neven, G. (2004). Security proofs for identity based identification and signature schemes. In Advances in Cryptology EUROCRYPT, LNCS (Vol. 3027, pp. 268−286). Heidelberg: Springer.Google Scholar
  13. 13.
    Xu, S., Mu, Y., & Susilo, W. (2005). Efficient authentication scheme for routing in mobile ad hoc networks. Proceedings of Embedded and Ubiquitous Computing EUC 2005 Workshops, LNCS, 3823: 854863.Google Scholar
  14. 14.
    Xu, S., Mu, Y., & Susilo, W. (2006). Online/offline signatures and multisignatures for AODV and DSR routing security. Proceedings of Information Security and Privacy, LNCS, 4058, 99110.MATHGoogle Scholar
  15. 15.
    Li, F., Shirase, M., & Takagi, T. (2008). On the security of online/offline signatures and multisignatures from acisp06. Cryptology and Network Security, LNCS, 5339, 108119.MATHGoogle Scholar
  16. 16.
    Zhang, J., Yang, Y., Niu, X., Gao, S., Chen, H., & Geng, Q. (2009). An improved secure identity-based on-line/off-line signature scheme. Proceedings of Advances in Information Security and Assurance, LNCS, 5576, 588597.Google Scholar
  17. 17.
    Cao, X., Zeng, X., Kou, W., & Hu, L. (2009). Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology, 58(7), 3508–3517.CrossRefGoogle Scholar
  18. 18.
    Ming, Y., & Wang, Y. (2010). Improved identity based online/offline signature scheme. In Proceedings of Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 126–131).Google Scholar
  19. 19.
    Liu, J. K., Baek, J., Zhou, J., Yang, Y., & Wong, J. W. (2010). Efficient online/offline identity-based signature for wireless sensor network. Intenational Journal of Information Security, 9(4), 287296.Google Scholar
  20. 20.
    Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.CrossRefGoogle Scholar
  21. 21.
    Yasmin, R. (2012). An efficient authentication framework for wireless sensor networks. Ph.D. thesis, School of Computer Science College of Engineering and Physical Sciences, The University of Birmingham.Google Scholar
  22. 22.
    Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATHGoogle Scholar
  23. 23.
    802.15.4 - wireless medium access control (mac) and physical layer (phy) specications for low-rate wireless personal area networks (lr-wpans), IEEE-Computer- Society, 2003 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1237559&userType=inst.
  24. 24.
  25. 25.
  26. 26.
    Aranha, D., & Gouvêa, C. RELIC is an Efficient LIbrary for Cryptography. http://code.google.com/p/relic-toolkit/.

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Université Libre de BruxellesBruxellesBelgium
  2. 2.Orange LabsGrenobleFrance
  3. 3.Thapar UniversityPatialaIndia

Personalised recommendations