εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

被引:80
|
作者
Shim, Kyung-Ah [1 ]
Lee, Young-Ran [1 ]
Park, Cheol-Min [1 ]
机构
[1] KT Daeduk 2 Res Ctr, Natl Inst Math Sci, Div Fus & Convergence Math Sci, Taejon, South Korea
关键词
Identity-based system; Digital signature with message recovery; Broadcast authentication; Message integrity; Bilinear pairing; ELLIPTIC CURVE CRYPTOGRAPHY; SIGNATURES; PAIRINGS;
D O I
10.1016/j.adhoc.2012.04.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient identity-based broadcast authentication scheme. epsilon IBAS, to achieve security requirements in wireless sensor networks. To minimize communication and computational costs, we use a pairing-optimal identity-based signature scheme with message recovery, where the original message of the signature is not required to be transmitted together with the signature, as it can be recovered according to the verification/message recovery process. The epsilon IBAS scheme achieves a minimization of communication overhead, allowing the total energy consumption to be reduced by up to 48.5% compared to previous identity-based broadcast authentication schemes. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:182 / 189
页数:8
相关论文
共 50 条
  • [31] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [32] CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks
    Zhang, Jianmin
    Yu, Wenqi
    Liu, Xiande
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 846 - +
  • [33] Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
    Jenefa, J.
    Anita, E. A. Mary
    WIRELESS NETWORKS, 2021, 27 (05) : 3093 - 3108
  • [34] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18
  • [35] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [36] An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks
    Khan, Sarmad Ullah
    Pastrone, Claudio
    Lavagno, Luciano
    Spirito, Maurizio A.
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 1039 - 1045
  • [37] An Efficient Identity-based Multi-signcryption Scheme
    Qi, Z. H.
    Yang, H. C.
    Huang, H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 308 - 310
  • [38] An Efficient Identity-Based Online/Offline Encryption Scheme
    Liu, Joseph K.
    Zhou, Jianying
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 156 - 167
  • [39] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [40] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571