εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

被引:81
|
作者
Shim, Kyung-Ah [1 ]
Lee, Young-Ran [1 ]
Park, Cheol-Min [1 ]
机构
[1] KT Daeduk 2 Res Ctr, Natl Inst Math Sci, Div Fus & Convergence Math Sci, Taejon, South Korea
关键词
Identity-based system; Digital signature with message recovery; Broadcast authentication; Message integrity; Bilinear pairing; ELLIPTIC CURVE CRYPTOGRAPHY; SIGNATURES; PAIRINGS;
D O I
10.1016/j.adhoc.2012.04.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient identity-based broadcast authentication scheme. epsilon IBAS, to achieve security requirements in wireless sensor networks. To minimize communication and computational costs, we use a pairing-optimal identity-based signature scheme with message recovery, where the original message of the signature is not required to be transmitted together with the signature, as it can be recovered according to the verification/message recovery process. The epsilon IBAS scheme achieves a minimization of communication overhead, allowing the total energy consumption to be reduced by up to 48.5% compared to previous identity-based broadcast authentication schemes. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:182 / 189
页数:8
相关论文
共 50 条
  • [21] An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
    Qin, Zhongyuan
    Zhang, Xinshuai
    Feng, Kerong
    Zhang, Qunfang
    Huang, Jie
    SENSORS, 2014, 14 (10) : 17937 - 17951
  • [22] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
  • [23] Identity-based construction for secure and efficient handoff authentication schemes in wireless networks
    Zhang, Y. H.
    Chen, X. F.
    Li, H.
    Cao, J.
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (10) : 1121 - 1130
  • [24] An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks
    Chang, Guanghui
    Liang, Shaofei
    Xu, Guangxia
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1287 - 1294
  • [25] An efficient identity-based batch verification scheme for Vehicular Sensor Networks
    Zhang, Chenxi
    Lu, Rongxing
    Lin, Xiaodong
    Ho, Pin-Han
    Shen, Xuemin
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 816 - 824
  • [26] Poster abstract: Efficient broadcast authentication for wireless sensor networks
    Ayday, Erman
    Delgosha, Farshid
    Fekri, Faramarz
    2007 2ND IEEE WORKSHOP ON NETWORKING TECHNOLOGIES FOR SOFTWARE DEFINE RADIO NETWORKS, 2007, : 61 - 62
  • [27] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234
  • [28] Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [29] An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
    CHENG Hong-bing 1
    2.College of Information Engineering
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 31 - 38
  • [30] Identity-based key management scheme with provable security for wireless sensor networks
    Zhou, Nanrun
    Jiang, Qiongxi
    Chen, Xun
    Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081