Abstract
Authentication is an important aspect for security in any cryptographic application. For Wireless Sensor Networks (WSN), authentication of a message is a vital concern. Authentication is provided through digital signature, and the cost of signing a message is a crucial factor due to the resource constraint nature of a sensor mote. So, there is a need to optimize the cost of computations, involved in the digital signature. In this paper, we present a Pairing-Free Identity Based digital Signature (PF-IBS) algorithm for WSN. PF-IBS is proven secure in terms of existential UnForgeability in the random oracle model against Adaptive Chosen Message Attack (UF-PF-IBS-ACMA). For the performance evaluation of the PF-IBS algorithm, the experimental setup includes MICAz sensor mote with TinyOS and RELIC-Toolkit cryptographic library. The results are gathered with the help of an emulator AVRORA.
Similar content being viewed by others
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. Security in distributed: Grid, and pervasive computing. Boca Raton: CRC Press.
Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
Olariu, S. (2005). Information assurance in wireless sensor networks. In Proceedings of the 19th IEEE international conference on parallel and distributed processing symposium.
Chen, Y., & Zhao, Q. (2005). On the lifetime of wireless sensor networks. IEEE Communications Letters, 9(11), 976–978.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84 on advances in cryptology (pp. 47–53).
Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of 3rd IEEE international conference on pervasive computing and communications.
Guillou, L. C., & Quisquater, J. (1989). A paradoxical identity-based signature scheme resulting from zero-knowledge. In Proceedings of CRYPTO 88, LNCS, 403: 216231. Springer, Berlin.
Yi, X. (2003). An identity-based signature scheme from the Weil Pairing. IEEE Communications Letters, 7(2), 67–69.
Cha, J., & Cheon, J. (2003). An identity-based signature from gap Diffie–Hellman groups, PKC-2003. LNCS, 2567, 1830.
Hess, F. (2003). Efficient identity based signature schemes based on pairings. In Nyberg, K., & Heys, H. M. (Eds.) SAC-2002, LNCS (Vol. 2595, pp. 310−324). Heidelberg: Springer.
Bellare, M., Namprempre, C., & Neven, G. (2004). Security proofs for identity based identification and signature schemes. In Advances in Cryptology EUROCRYPT, LNCS (Vol. 3027, pp. 268−286). Heidelberg: Springer.
Xu, S., Mu, Y., & Susilo, W. (2005). Efficient authentication scheme for routing in mobile ad hoc networks. Proceedings of Embedded and Ubiquitous Computing EUC 2005 Workshops, LNCS, 3823: 854863.
Xu, S., Mu, Y., & Susilo, W. (2006). Online/offline signatures and multisignatures for AODV and DSR routing security. Proceedings of Information Security and Privacy, LNCS, 4058, 99110.
Li, F., Shirase, M., & Takagi, T. (2008). On the security of online/offline signatures and multisignatures from acisp06. Cryptology and Network Security, LNCS, 5339, 108119.
Zhang, J., Yang, Y., Niu, X., Gao, S., Chen, H., & Geng, Q. (2009). An improved secure identity-based on-line/off-line signature scheme. Proceedings of Advances in Information Security and Assurance, LNCS, 5576, 588597.
Cao, X., Zeng, X., Kou, W., & Hu, L. (2009). Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology, 58(7), 3508–3517.
Ming, Y., & Wang, Y. (2010). Improved identity based online/offline signature scheme. In Proceedings of Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 126–131).
Liu, J. K., Baek, J., Zhou, J., Yang, Y., & Wong, J. W. (2010). Efficient online/offline identity-based signature for wireless sensor network. Intenational Journal of Information Security, 9(4), 287296.
Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.
Yasmin, R. (2012). An efficient authentication framework for wireless sensor networks. Ph.D. thesis, School of Computer Science College of Engineering and Physical Sciences, The University of Birmingham.
Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.
802.15.4 - wireless medium access control (mac) and physical layer (phy) specications for low-rate wireless personal area networks (lr-wpans), IEEE-Computer- Society, 2003 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1237559&userType=inst.
Crossbow, MICAz, http://bullseye.xbow.com:81/Products/productdetails.aspx?sid=164.
TinyOS, TinyOS Documentation Wiki. http://tinyos.stanford.edu/tinyos-wiki/index.php/Main_Page.
Aranha, D., & Gouvêa, C. RELIC is an Efficient LIbrary for Cryptography. http://code.google.com/p/relic-toolkit/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sharma, G., Bala, S. & Verma, A.K. PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks. Wireless Pers Commun 97, 1185–1196 (2017). https://doi.org/10.1007/s11277-017-4560-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4560-1