A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks

被引:4
作者
Ullah, Syed Sajid [1 ,2 ]
Hussain, Saddam [3 ]
Uddin, Mueen [4 ]
Alroobaea, Roobaea [5 ]
Iqbal, Jawaid [6 ]
Baqasah, Abdullah M. [7 ]
Abdelhaq, Maha [8 ]
Alsaqour, Raed [9 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
[2] Villanova Univ, Dept Elect & Comp Engn, Villanova, PA 19085 USA
[3] Univ Brunei Darussalam, Sch Digital Sci, Jalan Tungku Link, BE-1410 Gadong, Brunei
[4] Univ Doha Sci & Technol, Coll Comp & IT, Doha 24449, Qatar
[5] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
[6] Capital Univ Sci & Technol, Dept Comp Sci, Islamabad 44000, Pakistan
[7] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
[8] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[9] Saudi Elect Univ, Coll Comp & Informat, Dept Informat Technol, Riyadh 93499, Saudi Arabia
关键词
underwater wireless sensor networks; certificateless online; offline signature; authentication scheme; NAMED DATA NETWORKING; CONTENT POISONING ATTACK; SECURE COMMUNICATION; INTERNET; LIGHTWEIGHT; SIGNCRYPTION;
D O I
10.3390/s22145150
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very sensitive and unique, the authentication of users is very important to access the data and information. UWSNs have unique communication and computation needs that are not met by the existing digital signature techniques. As a result, a lightweight signature scheme is required to meet the communication and computation requirements. In this research, we present a Certificateless Online/Offline Signature (COOS) mechanism for UWSNs. The proposed scheme is based on the concept of a hyperelliptic curves cryptosystem, which offers the same degree of security as RSA, bilinear pairing, and elliptic curve cryptosystems (ECC) but with a smaller key size. In addition, the proposed scheme was proven secure in the random oracle model under the hyperelliptic curve discrete logarithm problem. A security analysis was also carried out, as well as comparisons with appropriate current online/offline signature schemes. The comparison demonstrated that the proposed scheme is superior to the existing schemes in terms of both security and efficiency. Additionally, we also employed the fuzzy-based Evaluation-based Distance from Average Solutions (EDAS) technique to demonstrate the effectiveness of the proposed scheme.
引用
收藏
页数:22
相关论文
共 36 条
  • [1] MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices
    Addobea, Abigail Akosua
    Hou, Jun
    Li, Qianmu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [2] Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges
    Alfouzan, Faisal Abdulaziz
    [J]. JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2021, 9 (07)
  • [3] [Anonymous], 2004, ACM T EMBED COMPUT S
  • [4] SecFUN: Security Framework for Underwater acoustic sensor Networks
    Ateniese, Giuseppe
    Capossele, Angelo
    Gjanci, Petrika
    Petrioli, Chiara
    Spaccini, Daniele
    [J]. OCEANS 2015 - GENOVA, 2015,
  • [5] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [6] Capossele A., 2017, P INT C UND NETW SYS
  • [7] Carman D., 2000, CONSTRAINTS APPROACH, P1
  • [8] Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
  • [9] A new provably secure certificateless short signature scheme
    Choi, Kyu Young
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1760 - 1768
  • [10] Dan Liu, 2017, International Journal of Network Security, V19, P127, DOI 10.6633/IJNS.201701.19(1).14