Skip to main content
Log in

Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In wireless sensor networks (WSN), broadcast authentication is an important security service that provides secure communication. Several mobile users are allowed by this broadcast authentication service. There are some concerns in the sensor network, which depend on security based on maintaining consumer untracking and privacy for data transmission. To overcome the concern of security issues, an Identity (ID)-based cryptography method is introduced. This paper presented a Pairing-Free Identity-based Digital Signature (PF-IBDS) Algorithm based on Modified Elliptic Curve Cryptography (MECC) by using Battle Royal Optimization Algorithm. The main aim of this paper is to secure the data transmission for message authentication. The proposed protocol is to enhance the speed of authentication, reduce the signature size and speed up the signature verification. Moreover, this paper analyses the security by BAN (Burrows–Abadi–Needham) logic and comparing with the existing protocols. It is verified that the developed protocol is protected and well-organized for peer-to-peer communications. Therefore, the proposed method offers secure key management, fast authentication, and also minimizes the computation overhead. The proposed authentication process is simulated in the Java platform. The performance of this protocol has compared with other existing approaches in terms of key verification time, key generation time and computational time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Code Availability

Custom code.

References

  1. Hamsha, K., & Nagaraja, G. S. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNs. international conference on ubiquitous communications and network computing (pp. 188–197). Springer.

    Chapter  Google Scholar 

  2. Mesmoudi, S., Benadda, B., & Mesmoudi, A. (2019). SKWN: Smart and dynamic key management scheme for wireless sensor networks. International Journal of Communication Systems, 32(7), 3930.

    Article  Google Scholar 

  3. Ghani, A., Mansoor, K., Mehmood, S., Chaudhry, S. A., Rahman, A. U., & Saqib, M. N. (2019). Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems, 32(16), 4139.

    Article  Google Scholar 

  4. Yousefpoor, M. S., & Barati, H. (2019). Dynamic key management algorithms in wireless sensor networks: A survey. Computer Communications, 134, 52–69.

    Article  Google Scholar 

  5. Laouid, A., Dahmani, A., Hassen, H. R., Bounceur, A., Euler, R., Lalem, F., & Tari, A. (2019). A self-managing volatile key scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10(9), 3349–3364.

    Article  Google Scholar 

  6. Das, R., Dash, D and Sarkar, M.K. (2020). HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN. Wireless Personal Communications, 1–34.

  7. James, S., Thumbur, G., & Reddy, P. V. (2021). An efficient pairing-free identity based proxy blind signature scheme with message recovery. The ISC International Journal of Information Security, 13(1), 59–72.

    Google Scholar 

  8. Hakeem, S. A. A., & Kim, H. W. (2021). Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G–V2X. Sensors, 21(2), 665.

    Article  Google Scholar 

  9. Kumar, D., Singh, H.K and Ahlawat, C. (2019). A secure three-factor authentication scheme for wireless sensor networks using ECC. Journal of Discrete Mathematical Sciences and Cryptography, 1–22.

  10. Luo, Y., Yao, L., Liu, J., Zhang, D and Cao, L. (2019). A block cryptographic algorithm for wireless sensor networks based on hybrid chaotic map. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2790–2797.

  11. Chen, M., Lee, T.-F., & Pan, J.-I. (2019). An enhanced lightweight dynamic pseudonym identity-based authentication and key agreement scheme using wireless sensor networks for agriculture monitoring. Sensors, 19(5), 2790–2797.

    Google Scholar 

  12. Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with beta gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903–4914.

    Article  Google Scholar 

  13. Yu, B and Li, H. (2019). Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things. International Journal of Distributed Sensor Networks 15(9).

  14. Kumar, V., Ray, S., Dasgupta, M and Khan, M.K. (2021). A Pairing-Free Identity-Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography. Wireless Personal Communications, 1–17.

  15. Majumder, S., Ray, S., Sadhukhan, D., Khan, M.K and Dasgupta, M. (2020). ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things. Wireless Personal Communications, 1–30.

  16. Deng, L. (2020). An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 34(4), 208–215.

    Article  Google Scholar 

  17. Abouelkheir, E., & El-sherbiny, S. (2020). Pairing-free identity-based aggregate signcryption scheme. IET Information Security, 14(6), 625–632.

    Article  Google Scholar 

  18. Kumar, M. (2019). AOR-ID-KAP: An authenticated one-round identity-based key agreement protocol for wireless sensor network. computational intelligence in sensor networks (pp. 427–454). Springer.

    Chapter  Google Scholar 

  19. Helali, A., Msolli, A., Maaref, H., & Mghaieth, R. (2021). KMPH: Key management scheme based on pool-hash for WSN. Journal of Circuits, Systems and Computers, 30(01), 2150003.

    Article  Google Scholar 

  20. Morales-Sandoval, M., Flores, L.A.R., Cumplido, R., Garcia-Hernandez, J.J., Feregrino, C and Algredo, I. (2021). A Compact FPGA-Based Accelerator for Curve-Based Cryptography in Wireless Sensor Networks. Journal of Sensors 2021.

  21. Yuan, E., Wang, L., Cheng, S., Ao, N., & Guo, Q. (2020). A key management scheme based on pairing-free identity-based digital signature algorithm for heterogeneous wireless sensor networks. Sensors, 20(6), 1543.

    Article  Google Scholar 

  22. Albakri, A., Harn, L., & Song, S. (2019). Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN). Security and communication networks, 2019, 1–11.

    Article  Google Scholar 

  23. Meshram, C., Lee, C.-C., Meshram, S. G., & Khan, M. K. (2019). An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Computing, 23(24), 13127–13138.

    Article  Google Scholar 

  24. Zhang, X., Fu, X., Hong, L., Liu, Y., & Wang, L. (2020). Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network. International Journal of Distributed Sensor Networks, 16(6), 1550147720928733.

    Article  Google Scholar 

  25. Zhu, H., Wang, Y., Wang, C., & Cheng, X. (2021). An efficient identity- based proxy signcryption using lattice. Future Generation Computer Systems, 117, 321–327.

    Article  Google Scholar 

  26. Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., & Bentaleb, A. (2019). Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks, 94, 101948.

    Article  Google Scholar 

  27. Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.

    Article  Google Scholar 

  28. Kasyoka, P., Kimwele, M., & Angolo, S. M. (2020). Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography. Engineering Reports, 2(7), e12176.

    Article  Google Scholar 

  29. Abdaoui, A., Erbad, A., Al-Ali, A., Mohamed, A and Guizani, M. (2020). Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication. In 2020 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE, 1041–1047.

  30. Goudosis, A and Katsikas, S.K. (2020). Secure AIS with Identity-Based Authentication and Encryption. TransNav: International Journal on Marine Navigation and Safety of Sea Transportation 14(2).

  31. Patel, M., & Patel, R. (2021). Improved identity based encryption system (IIBES): A mechanism for eliminating the key-escrow problem. Emerging Science Journal, 5(1), 77–84.

    Article  Google Scholar 

  32. Pavithran, D., Al-Karaki, J. N., & Shaalan, K. (2021). Edge-based blockchain architecture for event-driven iot using hierarchical identity based encryption. Information Processing & Management, 58(3), 102528.

    Article  Google Scholar 

  33. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2019). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.

    Article  Google Scholar 

  34. Bashirpour, H., Bashirpour, S., Shamshirband, S., & Chronopoulos, A. T. (2019). An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (wsns). Mathematical and Computational Applications, 23(2), 17.

    Article  Google Scholar 

  35. Adhikari, S., & Ray, S. (2019). A lightweight and secure IoT communication framework in content-centric network using elliptic curve cryptography. Recent trends in communication, computing, and electronics (pp. 207–216). Springer.

    Chapter  Google Scholar 

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivek Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, V., Ray, S. Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm. Wireless Pers Commun 123, 2341–2365 (2022). https://doi.org/10.1007/s11277-021-09244-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09244-y

Keywords

Navigation