Advertisement

The Distributed Signature Scheme (DSS) Based on RSA

Chapter
Part of the Risk Engineering book series (RISK)

Abstract

The Distributed Signature Scheme (DSS) is another important security service. It enables sensor nodes to communicate securely with each other. The main problem is to establish a secure signature between communicating nodes.

References

  1. 1.
    Liu, D., Ning, P.: Security for wireless sensor networks. Advances in Information Security, p. 28. Springer Science and Business Media, Berlin (2007)Google Scholar
  2. 2.
    Zhu, H., Bao, F., Deng, R.H., Kim, K.: Computing of trust in wireless networks. In: Proceedings of 60th IEEE Vehicular Technology Conference, vol. 4, pp. 2621–2624 (2004)Google Scholar
  3. 3.
    Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 263–270 (1999)Google Scholar
  4. 4.
    Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, pp. 384–391 (2003)Google Scholar
  5. 5.
    Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: Tag: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Oper. Syst. Rev. 36(SI), 131–146Google Scholar
  6. 6.
    Przydatek, B., Song, D., Perrig, A.: Sia: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255–265 (2003)Google Scholar
  7. 7.
    Shrivastava, N., Buragohain, C., Agrawal, D., Suri, S.: Medians and beyond: New aggregation techniques for sensor networks. In: SenSys ’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 239–249 (2004)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  9. 9.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, vol. 197(23), pp. 197–213 (2003)Google Scholar
  10. 10.
    Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN ’04), pp. 43–52 (2004)Google Scholar
  11. 11.
    Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)CrossRefGoogle Scholar
  12. 12.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code (2nd ed). Wiley, New York, p. 758 (1996)Google Scholar
  13. 13.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit cpus. In: 2004 Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132 (2004)Google Scholar
  14. 14.
    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T.: Threshold RSA for dynamic and ad-hoc groups. In: Advances in Cryptology—EUROCRYPT 2008, 4965/2008, pp. 88–107. Springer, BerlinGoogle Scholar
  15. 15.
    Wong, T.M., Wang, C., Wing, J.M.: Verifiable secret redistribution for archive systems. In: Proceedings of the First International IEEE Security in Storage Workshop, pp. 94–105 (2002)Google Scholar
  16. 16.
    Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications, Technical Report ISSE TR-97-01, George Mason University (1997)Google Scholar
  17. 17.
    National Institute of Standards and Technology.: Digital signature standard. JIST FIPS PUB 186, U.S. Department of Commerce (1994)Google Scholar
  18. 18.
    Jie-jun, K., Zerfos, P., Hai-yun, L., Song-wu, L., Li-xia, Z.: Providing robust and ubiquitous security support for MANET. In: IEEE 9th International Conference on Network Protocols (ICNP), p. 251 (2001)Google Scholar
  19. 19.
    Hai-yun, L., Jie-jun, K., Zerfos, P., Song-wu, L., Li-xia, Z.: URSA: Ubiquitous and robust access control for mobile ad hoc networks. In: IEEE/ACM Transactions on Networking (ToN), vol. 12(6), pp. 1049–1063 (2004)Google Scholar
  20. 20.
    Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in P2P and MANETs: The case of membership control. In: IEEE 11th International Conference on Network Protocol (ICNP), pp. 336–345 (2003)Google Scholar
  21. 21.
    Jarecki, S., Saxena, N., Yi, J.H.: Cryptanalyzing the proactive RSA signature scheme in the URSA ad hoc network access control protocol. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) (2004)Google Scholar
  22. 22.
    Blakely, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48 (1978)Google Scholar
  23. 23.
    Rui-shan, Z., Ke-fei, C.: An efficient proactive RSA scheme for large-scale ad hoc networks. J. Shanghai Univ. Engl. Ed. 11(1), 64–67 (2007)CrossRefGoogle Scholar
  24. 24.
    ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory. IT-31(4), 469–472 (1985)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Tanzania Industrial Research Development OrganisationTIRDO/North West UniversityDar Es SalaamTanzania
  2. 2.Far East Energy Management Company (FEEMC)VladivostokRussia

Personalised recommendations