Skip to main content

An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

  • 1746 Accesses

Abstract

Certificateless signature cryptography is an efficient approach studied widely because it eliminates the need of certificate authority in public key infrastructure. There are number of security algorithms based on PKC (Public Key Cryptography), ID based certificate less schemes using bilinear maps assumptions. But implementation costs of these schemes are very high. On the other hand RSA is a scheme widely applied in real-life scenarios. So in this paper we proposed a RSA based certificate less signature scheme especially for wireless sensor networks. We have shown that this scheme is secure in random oracles model. A random oracles model is a way to proof the security of cryptographic algorithms which use hash functions and exponential operations in algorithms. Security of this scheme is closely related to discrete logarithm problem. Our scheme provide security against type I attack, type II attack, it also ensures integrity, non-repudiation and authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  2. Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Advances in Cryptology (ASIACRYPT 2003). Lecture Notes in Computer Science, pp. 452–473 (2003)

    Google Scholar 

  3. Amin, F., Jahangir, H., Rasifard, H.: Analysis of public-key cryptography for wireless sensor networks security 2(5), 403–408 (2008)

    Google Scholar 

  4. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Communications Surveys Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

  5. Zhang, J., Mao, J.: An efficient rsa-based certificateless signature scheme. Journal of Systems and Software 85(3), 638–642 (2012)

    Article  MathSciNet  Google Scholar 

  6. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  7. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1(2–3), 293–315 (2003)

    Google Scholar 

  8. Cheng, C.-C., Sun, C.-y., Chang, S.: A strong RSA-based and certificateless-based Signature scheme. International Journal of Network Security 0(0), 1–7 (2014)

    Google Scholar 

  9. Sharma, G., Verma, A.: Breaking the rsa-based certificateless signature scheme. Information-An International Interdisciplinary Journal 16(11), 7831–7836 (2013)

    MathSciNet  Google Scholar 

  10. Sharma, G., Bala, S., Verma, A.K.: An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. International Journal of Network Security 0(0), 1–8 (2014)

    Article  Google Scholar 

  11. Tsai, J., Lo, N., Wu, T.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. International Journal of Communication Systems 27(7), 1083–1090 (2014)

    Article  Google Scholar 

  12. Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. Journal of Systems and Software 85(6), 1409–1417 (2012)

    Article  Google Scholar 

  13. Tso, R., Yi, X., Huang, X.: Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing 55(2), 173–191 (2011)

    Article  Google Scholar 

  14. Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems 27(10), 2083–2091 (2014)

    Article  MathSciNet  Google Scholar 

  15. Zhang, X., Heys, H., Cheng, L.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 25th Biennial Symposium on Communications (QBSC 2010), pp. 168–172 (2010)

    Google Scholar 

  16. Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3989, pp. 293–308 (2006)

    Google Scholar 

  17. He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems 25(11), 1432–1442 (2012)

    Article  Google Scholar 

  18. He, D., Khan, M., Wu, S.: On the security of a rsa-based certificateless signature scheme. International Journal of Network Security 15(6), 408–410 (2013)

    Google Scholar 

  19. Glouche, Y., Genet, T., Houssay, E.: SPAN A Security Protocol Animator for AVISPA. IRISA, September 2008

    Google Scholar 

  20. Wang, C., Long, D., Tang, Y.: An efficient certificateless signature from pairings. International Journal of Network Security 8(1), 96–100 (2009)

    Google Scholar 

  21. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications, pp. 62–73 (1993)

    Google Scholar 

  22. Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.M.: A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions. IEEE Proceedings 100(12), 3172–3186 (2012)

    Article  Google Scholar 

  23. Han, K., Luo, J., Liu, Y., Vasilakos, A.V.: Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey. Proceedings of IEEE Communications Magazine 51(7) (2013)

    Google Scholar 

  24. Zhang, Z., Wang, H., Vasilakos, A.V., Fang, H.: ECG-Cryptography and Authentication in Body Area Networks. IEEE Transactions on Information Technology in Biomedicine 16(6), 1070–1078 (2012)

    Article  Google Scholar 

  25. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Networks 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  26. Yan, Z., et al.: A survey on trust management for Internet of Things. Journal of Network and Computer Applications 42, 120–134 (2014)

    Article  Google Scholar 

  27. Zhang, Y., et al.: A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications 67(1), 97–117 (2013)

    Article  Google Scholar 

  28. He, D., et al.: ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Transactions on Information Technology in Biomedicine 16(4), 623–632 (2012)

    Article  Google Scholar 

  29. Wang, T., et al.: Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks 21(6), 1835–1846 (2015)

    Article  Google Scholar 

  30. Zhou, J., et al.: 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)

    Article  Google Scholar 

  31. Fadlullah, Z.M., et al.: DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis. IEEE/ACM Trans. Network 18(4), 1234–1247 (2010)

    Article  Google Scholar 

  32. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Communications Surveys Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Singh, J., Kumar, V., Kumar, R. (2016). An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics