εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

被引:81
|
作者
Shim, Kyung-Ah [1 ]
Lee, Young-Ran [1 ]
Park, Cheol-Min [1 ]
机构
[1] KT Daeduk 2 Res Ctr, Natl Inst Math Sci, Div Fus & Convergence Math Sci, Taejon, South Korea
关键词
Identity-based system; Digital signature with message recovery; Broadcast authentication; Message integrity; Bilinear pairing; ELLIPTIC CURVE CRYPTOGRAPHY; SIGNATURES; PAIRINGS;
D O I
10.1016/j.adhoc.2012.04.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient identity-based broadcast authentication scheme. epsilon IBAS, to achieve security requirements in wireless sensor networks. To minimize communication and computational costs, we use a pairing-optimal identity-based signature scheme with message recovery, where the original message of the signature is not required to be transmitted together with the signature, as it can be recovered according to the verification/message recovery process. The epsilon IBAS scheme achieves a minimization of communication overhead, allowing the total energy consumption to be reduced by up to 48.5% compared to previous identity-based broadcast authentication schemes. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:182 / 189
页数:8
相关论文
共 50 条
  • [31] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (31-38):
  • [32] An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation
    Yasmin, Rehana
    Ritter, Eike
    Wang, Guilin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 126 - 133
  • [33] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zeng, Kai
    Moran, Patrick J.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4136 - 4144
  • [34] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Zeng, Kai
    Lou, Wenjing
    Moran, Patrick J.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 502 - 514
  • [35] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks
    Li Jing-feng
    Wei Da-wei
    Kou Hong-zhao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
  • [36] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [37] A Dynamic Identity User Authentication Scheme in Wireless Sensor Networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1132 - 1137
  • [38] Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network
    LI Wen-ji
    ZHENG Kang-feng
    ZHANG Dong-mei
    YE-Qing
    YANG Yi-xian
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2013, 20 (04) : 80 - 86
  • [39] Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network
    LI Wen-ji
    ZHENG Kang-feng
    ZHANG Dong-mei
    YE-Qing
    YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2013, (04) : 80 - 86
  • [40] Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks
    Afianti, Farah
    Wirawan
    Suryani, Titiek
    SENSORS, 2018, 18 (11)