Skip to main content
Log in

PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Authentication is an important aspect for security in any cryptographic application. For Wireless Sensor Networks (WSN), authentication of a message is a vital concern. Authentication is provided through digital signature, and the cost of signing a message is a crucial factor due to the resource constraint nature of a sensor mote. So, there is a need to optimize the cost of computations, involved in the digital signature. In this paper, we present a Pairing-Free Identity Based digital Signature (PF-IBS) algorithm for WSN. PF-IBS is proven secure in terms of existential UnForgeability in the random oracle model against Adaptive Chosen Message Attack (UF-PF-IBS-ACMA). For the performance evaluation of the PF-IBS algorithm, the experimental setup includes MICAz sensor mote with TinyOS and RELIC-Toolkit cryptographic library. The results are gathered with the help of an emulator AVRORA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.

    Article  Google Scholar 

  2. Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. Security in distributed: Grid, and pervasive computing. Boca Raton: CRC Press.

    Google Scholar 

  3. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  4. Olariu, S. (2005). Information assurance in wireless sensor networks. In Proceedings of the 19th IEEE international conference on parallel and distributed processing symposium.

  5. Chen, Y., & Zhao, Q. (2005). On the lifetime of wireless sensor networks. IEEE Communications Letters, 9(11), 976–978.

    Article  Google Scholar 

  6. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84 on advances in cryptology (pp. 47–53).

  7. Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of 3rd IEEE international conference on pervasive computing and communications.

  8. Guillou, L. C., & Quisquater, J. (1989). A paradoxical identity-based signature scheme resulting from zero-knowledge. In Proceedings of CRYPTO 88, LNCS, 403: 216231. Springer, Berlin.

  9. Yi, X. (2003). An identity-based signature scheme from the Weil Pairing. IEEE Communications Letters, 7(2), 67–69.

    Article  Google Scholar 

  10. Cha, J., & Cheon, J. (2003). An identity-based signature from gap Diffie–Hellman groups, PKC-2003. LNCS, 2567, 1830.

    Google Scholar 

  11. Hess, F. (2003). Efficient identity based signature schemes based on pairings. In Nyberg, K., & Heys, H. M. (Eds.) SAC-2002, LNCS (Vol. 2595, pp. 310−324). Heidelberg: Springer.

  12. Bellare, M., Namprempre, C., & Neven, G. (2004). Security proofs for identity based identification and signature schemes. In Advances in Cryptology EUROCRYPT, LNCS (Vol. 3027, pp. 268−286). Heidelberg: Springer.

  13. Xu, S., Mu, Y., & Susilo, W. (2005). Efficient authentication scheme for routing in mobile ad hoc networks. Proceedings of Embedded and Ubiquitous Computing EUC 2005 Workshops, LNCS, 3823: 854863.

  14. Xu, S., Mu, Y., & Susilo, W. (2006). Online/offline signatures and multisignatures for AODV and DSR routing security. Proceedings of Information Security and Privacy, LNCS, 4058, 99110.

    MATH  Google Scholar 

  15. Li, F., Shirase, M., & Takagi, T. (2008). On the security of online/offline signatures and multisignatures from acisp06. Cryptology and Network Security, LNCS, 5339, 108119.

    MATH  Google Scholar 

  16. Zhang, J., Yang, Y., Niu, X., Gao, S., Chen, H., & Geng, Q. (2009). An improved secure identity-based on-line/off-line signature scheme. Proceedings of Advances in Information Security and Assurance, LNCS, 5576, 588597.

    Google Scholar 

  17. Cao, X., Zeng, X., Kou, W., & Hu, L. (2009). Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology, 58(7), 3508–3517.

    Article  Google Scholar 

  18. Ming, Y., & Wang, Y. (2010). Improved identity based online/offline signature scheme. In Proceedings of Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 126–131).

  19. Liu, J. K., Baek, J., Zhou, J., Yang, Y., & Wong, J. W. (2010). Efficient online/offline identity-based signature for wireless sensor network. Intenational Journal of Information Security, 9(4), 287296.

    Google Scholar 

  20. Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.

    Article  Google Scholar 

  21. Yasmin, R. (2012). An efficient authentication framework for wireless sensor networks. Ph.D. thesis, School of Computer Science College of Engineering and Physical Sciences, The University of Birmingham.

  22. Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.

    Article  MATH  Google Scholar 

  23. 802.15.4 - wireless medium access control (mac) and physical layer (phy) specications for low-rate wireless personal area networks (lr-wpans), IEEE-Computer- Society, 2003 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1237559&userType=inst.

  24. Crossbow, MICAz, http://bullseye.xbow.com:81/Products/productdetails.aspx?sid=164.

  25. TinyOS, TinyOS Documentation Wiki. http://tinyos.stanford.edu/tinyos-wiki/index.php/Main_Page.

  26. Aranha, D., & Gouvêa, C. RELIC is an Efficient LIbrary for Cryptography. http://code.google.com/p/relic-toolkit/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Sharma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, G., Bala, S. & Verma, A.K. PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks. Wireless Pers Commun 97, 1185–1196 (2017). https://doi.org/10.1007/s11277-017-4560-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4560-1

Keywords

Navigation