Short Online/Off-line Signature Scheme for Wireless Sensor Networks

Short Online/Off-line Signature Scheme for Wireless Sensor Networks

Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar, Naomie Salim
Copyright: © 2015 |Volume: 9 |Issue: 1 |Pages: 15
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466676350|DOI: 10.4018/IJISP.2015010103
Cite Article Cite Article

MLA

Alquraishee, Anser Ghazzaal Ali, et al. "Short Online/Off-line Signature Scheme for Wireless Sensor Networks." IJISP vol.9, no.1 2015: pp.47-61. http://doi.org/10.4018/IJISP.2015010103

APA

Alquraishee, A. G., Kar, J., & Salim, N. (2015). Short Online/Off-line Signature Scheme for Wireless Sensor Networks. International Journal of Information Security and Privacy (IJISP), 9(1), 47-61. http://doi.org/10.4018/IJISP.2015010103

Chicago

Alquraishee, Anser Ghazzaal Ali, Jayaprakash Kar, and Naomie Salim. "Short Online/Off-line Signature Scheme for Wireless Sensor Networks," International Journal of Information Security and Privacy (IJISP) 9, no.1: 47-61. http://doi.org/10.4018/IJISP.2015010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article proposes a novel construction of short Online/Off-line signature scheme with provable security in the random oracle model for wireless sensor network (WSN). Security of the proposed scheme relies on k-CAA Problem as well as Computational Diffie-Hellman problem and is resistant against chosen message attack. The scheme is suited for broadcast authentication and integrity of message exchanging between the sensor nodes. The process of generation of the signature is carried out in two phases online and off-line. The heavy computation is performed in off-line phase, i.e the base station. The actual signature will be generated in the sensor nodes. The authors assume that the online phase is more efficient. Here they have evaluated the size of the signature with respect to the size of the user's public key and compare with some current schemes. Also, the authors have evaluated the computational cost and time which shows the scheme is most suited to implement on sensor node.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.