Abstract
Certificateless signature cryptography is an efficient approach studied widely because it eliminates the need of certificate authority in public key infrastructure. There are number of security algorithms based on PKC (Public Key Cryptography), ID based certificate less schemes using bilinear maps assumptions. But implementation costs of these schemes are very high. On the other hand RSA is a scheme widely applied in real-life scenarios. So in this paper we proposed a RSA based certificate less signature scheme especially for wireless sensor networks. We have shown that this scheme is secure in random oracles model. A random oracles model is a way to proof the security of cryptographic algorithms which use hash functions and exponential operations in algorithms. Security of this scheme is closely related to discrete logarithm problem. Our scheme provide security against type I attack, type II attack, it also ensures integrity, non-repudiation and authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks 38, 393–422 (2002)
Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Advances in Cryptology (ASIACRYPT 2003). Lecture Notes in Computer Science, pp. 452–473 (2003)
Amin, F., Jahangir, H., Rasifard, H.: Analysis of public-key cryptography for wireless sensor networks security 2(5), 403–408 (2008)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Communications Surveys Tutorials 11(2), 52–73 (2009)
Zhang, J., Mao, J.: An efficient rsa-based certificateless signature scheme. Journal of Systems and Software 85(3), 638–642 (2012)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1(2–3), 293–315 (2003)
Cheng, C.-C., Sun, C.-y., Chang, S.: A strong RSA-based and certificateless-based Signature scheme. International Journal of Network Security 0(0), 1–7 (2014)
Sharma, G., Verma, A.: Breaking the rsa-based certificateless signature scheme. Information-An International Interdisciplinary Journal 16(11), 7831–7836 (2013)
Sharma, G., Bala, S., Verma, A.K.: An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. International Journal of Network Security 0(0), 1–8 (2014)
Tsai, J., Lo, N., Wu, T.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. International Journal of Communication Systems 27(7), 1083–1090 (2014)
Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. Journal of Systems and Software 85(6), 1409–1417 (2012)
Tso, R., Yi, X., Huang, X.: Efficient and short certificateless signatures secure against realistic adversaries. The Journal of Supercomputing 55(2), 173–191 (2011)
Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems 27(10), 2083–2091 (2014)
Zhang, X., Heys, H., Cheng, L.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 25th Biennial Symposium on Communications (QBSC 2010), pp. 168–172 (2010)
Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3989, pp. 293–308 (2006)
He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems 25(11), 1432–1442 (2012)
He, D., Khan, M., Wu, S.: On the security of a rsa-based certificateless signature scheme. International Journal of Network Security 15(6), 408–410 (2013)
Glouche, Y., Genet, T., Houssay, E.: SPAN A Security Protocol Animator for AVISPA. IRISA, September 2008
Wang, C., Long, D., Tang, Y.: An efficient certificateless signature from pairings. International Journal of Network Security 8(1), 96–100 (2009)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications, pp. 62–73 (1993)
Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.M.: A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions. IEEE Proceedings 100(12), 3172–3186 (2012)
Han, K., Luo, J., Liu, Y., Vasilakos, A.V.: Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey. Proceedings of IEEE Communications Magazine 51(7) (2013)
Zhang, Z., Wang, H., Vasilakos, A.V., Fang, H.: ECG-Cryptography and Authentication in Body Area Networks. IEEE Transactions on Information Technology in Biomedicine 16(6), 1070–1078 (2012)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Networks 20(8), 2481–2501 (2014)
Yan, Z., et al.: A survey on trust management for Internet of Things. Journal of Network and Computer Applications 42, 120–134 (2014)
Zhang, Y., et al.: A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools and Applications 67(1), 97–117 (2013)
He, D., et al.: ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks. IEEE Transactions on Information Technology in Biomedicine 16(4), 623–632 (2012)
Wang, T., et al.: Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks 21(6), 1835–1846 (2015)
Zhou, J., et al.: 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)
Fadlullah, Z.M., et al.: DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis. IEEE/ACM Trans. Network 18(4), 1234–1247 (2010)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Communications Surveys Tutorials 11(2), 52–73 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Singh, J., Kumar, V., Kumar, R. (2016). An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_58
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)