Towards an Aggregate Signature-based Authentication for Opportunistic Networks

被引:1
作者
Avoussoukpo, Cossi Blaise [1 ]
Xu, Chunxiang [2 ]
Tchenagnon, Marius [2 ]
Eltayieb, Nabeil [2 ]
机构
[1] Southwest Univ Finance & Econ, Coll Int Educ, Chengdu, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
来源
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020) | 2020年
关键词
Opportunistic Networks; Seed OppNet; Authentication; Aggregate Signature;
D O I
10.1109/cybersa49311.2020.9139650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic Networks are particular networks where independent nodes come together under the supervision of a Seed OppNet to achieve a precise goal. For only certified nodes are allowed to help an extended or expanded Seed OppNet achieve its goal; making sure that unauthorized users do not disrupt the smooth completion of the Seed OppNet's mission, Helpers' authentication is critical. However, despite the significant contributions tackling the issue of authentication within an OppNet's environment, so far, in literature, most OppNets authentication proposed schemes just focused on (Helper-Helper) authentication; there is no scheme intended to (Helpers-Seed OppNet) authentication in an extended OppNet's environment. Resorting to the properties of Digital Signature, BLS Signature and aggregate BLS signatures, this paper proposes an authentication mechanism that allows a Seed OppNet to process pieces of information effectively and efficiently. The proposed scheme is secure against the rogue pubic key, tapping, forgery, replay, and man-in-the-middle attacks.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] An Identity Authentication Scheme for Opportunistic Networks based on Multidimensional Scaling
    Cao, Xiaomei
    Yin, Ying
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 87 - 93
  • [22] An Efficient Fuzzy Certificateless Signature-Based Authentication Scheme Using Anonymous Biometric Identities for VANETs
    Wang, Liangliang
    Xu, Jiangwei
    Qin, Baodong
    Wen, Mi
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 292 - 307
  • [23] Authentication with Privacy Preservation in Opportunistic Networks
    Kumar, Prashant
    Chauhan, Naveen
    Chand, Narottam
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 183 - 188
  • [24] Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks
    Chen Xi
    Tian Youliang
    Li Xinghua
    Ma Jianfeng
    CHINA COMMUNICATIONS, 2011, 8 (04) : 132 - 140
  • [25] A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
    Shen, Limin
    Ma, Jianfeng
    Liu, Ximeng
    Wei, Fushan
    Miao, Meixia
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 546 - 554
  • [26] LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network
    Yadav, Kirti A.
    Vijayakumar, P.
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (7-8) : 473 - 489
  • [27] LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network
    Kirti A. Yadav
    P. Vijayakumar
    Annals of Telecommunications, 2022, 77 : 473 - 489
  • [28] An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
    Tang, Jiawei
    Liu, Anfeng
    Zhao, Ming
    Wang, Tian
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [29] Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks
    Parmar, Keyur
    Jinwala, Devesh C.
    INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 475 - 483
  • [30] Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
    Kalpana, S.
    Chandramathi, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12037 - 12047