McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems

被引:8
作者
Xu, Zhong [1 ,2 ]
Liu, Xue [1 ]
Zhang, Guoqing [2 ]
He, Wenbo [3 ]
机构
[1] McGill Univ, Sch Comp Sci, Montreal, PQ H3A 2A7, Canada
[2] Northwestern Polytech Univ, Coll Automat, Xian 710072, Shaanxi, Peoples R China
[3] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
基金
加拿大自然科学与工程研究理事会;
关键词
Certificateless Signature; MANETs; Cyber-Physical Systems; Security;
D O I
10.15837/ijccc.2008.4.2407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad Hoc Network is a self-configurable and self-organizing wireless network of mobile devices without fixed infrastructure support, which makes it a good candidate as underlying communication network for the Cyber-Physical Systems in emergency conditions such as earthquake, flood, and battlefields. In these scenarios, efficient communication schemes with security support are especially desired. Two cryptography approaches, the public key cryptography and the identity-based cryptography, face the costly and complex key management problem and the "key escrow" problem in the real-life deployment. Recently, the certificateless public key cryptography (CL-PKC) was introduced to address these problems in previous approaches. However, the efficiency of the schemes based on CL-PKC is not high and can be improved further. In this paper, we present an improved certificateless signature scheme (McCLS) based on bilinear pairings. First, we theoretically compare the efficiency of McCLS with that of existing certificateless signature schemes (CLS). Second, an empirical study is conducted to compare the traditional AODV with the McCLS scheme based on AODV (McDV) in their efficiency and effectiveness against two most common attacks (i.e. redirection attack and rushing attack). Results from theoretical analysis show that the new McCLS scheme is more efficient than existing CLS solutions, and results from empirical studies show that the McDV is able to resist the two common attacks without causing substantial degradation of the network performance.
引用
收藏
页码:395 / 411
页数:17
相关论文
共 27 条
  • [1] ALRIYAMI SS, 2003, LNCS
  • [2] ANAND M, 2007, SECURITY CHALLENGES
  • [3] [Anonymous], WIRELESS SELF ORG CY
  • [4] BECHLER M, 2004, INFOCOM 2004, V4
  • [5] Bellare M., 1993, CCS 93 P 1 ACM C COM, P62, DOI DOI 10.1145/168588.168596
  • [6] BONEH D, 2001, LNCS, V2139
  • [7] Cryptographic techniques for mobile ad-hoc networks
    Daza, Vanesa
    Herranz, Javier
    Morillo, Paz
    Rafols, Carla
    [J]. COMPUTER NETWORKS, 2007, 51 (18) : 4938 - 4950
  • [8] Deng HM, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P107
  • [9] HE W, 2007, P 5 IEEE INT C PERV, P201
  • [10] Hu YC, 2003, P 2 ACM WORKSH WIR S, P30, DOI DOI 10.1145/941311.941317