Skip to main content

Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

In the marine wireless sensor networks, marine sensors collect multidimensional data such as temperature, salinity, dissolved oxygen and chlorophyll concentration in the ocean using a single hardware unit for further statistical analysis. Once these data are collected, they will be sent to the satellites or vessels for scientific information processing purposes, e.g. computing the mean, the variance and making regression analysis. Verifiable computation (VC) always allows the computationally weak parties to execute computing function operations over outsourced data sets or perform data sets towards outsourced functions to the cloud and still provides an efficient way to verify the returned result, which is an important issue in marine wireless sensor networks. However, the oceangoing voyage vessels always have low computational abilities, in such a way that they may outsource some computations (that need expensive computation costs by themselves) to the data center on the land (e.g. cloud). The computational results cannot be used directly since the cloud may return an incorrect outcome for some profits. Hence, we design a secure publicly VC protocol called \({\mathcal {DM}}{-}{\mathcal {PVC}}\), which supports both public delegation and public verifiability properties and tackles outsourced functions and outsourced data sets in a combined way. We additionally prove the proposed \({\mathcal {DM}}{-}{\mathcal {PVC}}\) secure in the random oracle model and evaluate its performance in the end.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The “\(\bot \)” considers that the verification algorithm reject the worker’s answer \(\sigma _\texttt {output}\).

  2. 2.

    Here, we denote “” as the related variables belonging to \(\overline{\textsc {sk}}_{\bar{\texttt {F}},\psi }\). Note that \(\textsc {sk}_{\texttt {F},\psi }\) and \(\overline{\textsc {sk}}_{\bar{\texttt {F}},\psi }\) are pair-wise independent since all related “xx” and “” are independently and uniformly distributed. Here we omit the descriptions on the sampling process.

  3. 3.

    Similar to producing \(\overline{\textsc {sk}}_{\bar{\texttt {F}},\psi }\), we use “\(\overline{\mathrm {\texttt {xx}}}\)”-type variables to generate \(\overline{\textsc {ct}}_{\omega ,\texttt {G}}\).

References

  1. D’Este, C., De Souza, P., Sharman, C., Allen, S.: Relocatable, automated cost-benefit analysis for marine sensor network design. Sensors 12(3), 2874–2898 (2012)

    Article  Google Scholar 

  2. Wang, Z., Song, H., Watkins, D.W., Ong, K.G., Xue, P., Yang, Q., Shi, X.: Cyber-physical systems for water sustainability: challenges and opportunities. IEEE Commun. Mag. 53(5), 216–222 (2015)

    Google Scholar 

  3. Zhang, A., Yang, L., Zhang, S., Yu, J., Shu, Y.: Marine vehicle sensor network architecture and protocol designs for ocean observation. Sensors 12(1), 373–390 (2012)

    Google Scholar 

  4. Pengfei, H., Xing, K., Cheng, X., Wei, H., Zhu, H.: Information leaks out: attacks and countermeasures on compressive data gathering in wireless sensor networks. In: International Conference on Computer Communications (INFOCOM), pp. 1258–1266 (2014)

    Google Scholar 

  5. Huang, D., Zhao, D., Wei, L., Wang, Z., Yanling, D.: Modeling and analysis in marine big data: advances and challenges. Math. Probl. Eng. 1–13, 2015 (2015)

    Google Scholar 

  6. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg (2011)

    Google Scholar 

  7. Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111–131. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22792-9_7

    Chapter  Google Scholar 

  8. Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM Sigsac Conference on Computer and Communications Security, pp. 863–874 (2013)

    Google Scholar 

  9. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25

    Chapter  Google Scholar 

  10. Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM Conference on Computer and Communications Security, pp. 501–512 (2012)

    Google Scholar 

  11. Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6198, pp. 152–163. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14165-2_14

    Chapter  Google Scholar 

  12. Jiang, Y., Song, H., Wang, R., Ming, G., Sun, J., Sha, L.: Data-centered runtime verification of wireless medical cyber-physical system. IEEE Trans. Industr. Inform. PP(99), 1 (2016). doi:10.1109/TII.2016.2573762

    Article  Google Scholar 

  13. Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422–439. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28914-9_24

    Chapter  Google Scholar 

  14. Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483–501. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_26

    Chapter  Google Scholar 

  15. Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Technion-Israel Institute of Technology, Faculty of Computer Science (1996)

    Google Scholar 

  16. Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168–185. Springer, Heidelberg (2009). doi:10.1007/978-3-642-01957-9_11

    Chapter  Google Scholar 

  17. Giry, D.: Bluekrypt. https://www.keylength.com/en/

  18. Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptograph. Eng. 3(2), 111–128 (2013)

    Google Scholar 

  19. Zhang, F.: http://student.seas.gwu.edu/~zfwise/crypto. Technical report

  20. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 84(5), 1234–1243 (2001)

    MATH  Google Scholar 

Download references

Acknowledgement

We thank Ming Zeng and all anonymous reviewers. This work was supported by National Natural Science Foundation of China (61571191, 61572192, 61472142, 61402282, 61472249), the Science and Technology Commission of Shanghai Municipality (13JC1403502, 14YF1404200, 14YF1410400); Open Foundation of State Key Laboratory of Integrated Services Networks (ISN17-11) and International Science & Technology Cooperation & Exchange Projects of Shaanxi Province (2016KW-038).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haifeng Qian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, K., Wei, L., Li, X., Qian, H. (2017). Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics