Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks

作者: Chafika Benzaid , Sana Medjadba , Ameer Al-Nemrat , Nadjib Badache

DOI: 10.1109/ICCSE.2012.105

关键词: Message authentication codeElliptic curveSignature (logic)Key distribution in wireless sensor networksAuthenticationSecurity serviceAuthorizationPublic-key cryptographyDigital signatureWireless sensor networkComputer networkEnergy consumptionComputer science

摘要: Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs). Although symmetric-key-based µTESLA-like schemes were employed due to their energy efficiency, they all suffer from DoS attacks resulting the nature of delayed message authentication. Recently, several public-key-based have been proposed achieve immediate broadcast with significantly improved strength. While obviate vulnerability inherent schemes, signature verification time-consuming. Thus, speeding up problem considerable practical importance, especially resource-constrained environments. This paper presents an accelerated vBNN-IBS, pairing-free identity-based reduced size. A quantitative analysis demonstrates that vBNN-IBS reduces 38.62% consumption 4×4 grid-based WSN and runs 66% faster than traditional method. It also allows total be by 23.25% 25.14% compared to, respectively, IMBAS [1] EIBAS [13] ID-based schemes.

参考文章(14)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Kyung-Ah Shim, Young-Ran Lee, Cheol-Min Park, EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks ad hoc networks. ,vol. 11, pp. 182- 189 ,(2013) , 10.1016/J.ADHOC.2012.04.015
Darrel Hankerson, Alfred J. Menezes, Scott Vanstone, Guide to Elliptic Curve Cryptography ,(2004)
A.S. Wander, N. Gura, H. Eberle, V. Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks ieee international conference on pervasive computing and communications. pp. 324- 328 ,(2005) , 10.1109/PERCOM.2005.18
Panoat Chuchaisri, Richard Newman, Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks Mobile Networks and Applications. ,vol. 17, pp. 508- 525 ,(2012) , 10.1007/S11036-011-0349-8
Ralph C. Merkle, Protocols for Public Key Cryptosystems ieee symposium on security and privacy. pp. 122- 122 ,(1980) , 10.1109/SP.1980.10006
Don Johnson, Alfred Menezes, Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA) International Journal of Information Security. ,vol. 1, pp. 36- 63 ,(2001) , 10.1007/S102070100002
Xinxin Fan, Guang Gong, Accelerating signature-based broadcast authentication for wireless sensor networks ad hoc networks. ,vol. 10, pp. 723- 736 ,(2012) , 10.1016/J.ADHOC.2011.06.015
Donggang Liu, Peng Ning, Multilevel μTESLA: Broadcast authentication for distributed sensor networks ACM Transactions in Embedded Computing Systems. ,vol. 3, pp. 800- 836 ,(2004) , 10.1145/1027794.1027800
Peng Ning, An Liu, Wenliang Du, Mitigating DoS attacks against broadcast authentication in wireless sensor networks ACM Transactions on Sensor Networks. ,vol. 4, pp. 1- 35 ,(2008) , 10.1145/1325651.1325652