: An efficient identity-based broadcast authentication scheme in wireless sensor networks

Ad Hoc Networks - Tập 11 - Trang 182-189 - 2013
Kyung-Ah Shim1, Young-Ran Lee1, Cheol-Min Park1
1Division of Fusion and Convergence of Mathematical Sciences, National Institute for Mathematical Sciences, KT Daeduk 2 Research Center, 463-1, Yuseong-gu, Daejeon, Republic of Korea

Tài liệu tham khảo

Aranha, 2011, Faster explicit formulas for computing pairings over ordinary curves, 8 Barreto, 2002, Efficient algorithms for pairing-based cryptosystems, 354 Barreto, 2007, Efficient pairing computation on supersingular abelian varieties, Design, Codes and Cryptography, 42, 239, 10.1007/s10623-006-9033-6 Barreto, 2005, Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, 515 Boneh, 2004, Short signatures from the weil pairing, Journal of Cryptology, 17, 297, 10.1007/s00145-004-0314-9 R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxanomy and some efficient constructions, in: Proceedings of INFOCOMM’99, 1999, pp. 708–710. Cao, 2008, IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks, Computer communications, 31, 659, 10.1016/j.comcom.2007.10.017 S. Cheng, An efficient message authentication scheme for link state routing, in: Proceedings of ACSAC’97, 1997, pp. 90–98. J. Drissi, Q. Gu, Localized broadcast authentication in large sensor networks, in: Proceeding of ICNS’06, 2007, pp. 341–350. Galbraith, 2005, Pairings, advances in elliptic curve cryptography, vol. 317, 183, 10.1017/CBO9780511546570.011 Galindo, 2008, A killer application for pairings: authenticated key establishment in underwater wireless sensor networks, 120 Gaubatz, 2005, Public key cryptography in sensor networks-revisited, 2 N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in: Proceedings of CHES’04, 2004, pp. 119–132. Hess, 2003, Efficient identity based signature schemes based on pairings, 310 Hess, 2006, The Eta pairing revisited, IEEE Transactions on Information Theory, 52, 4595, 10.1109/TIT.2006.881709 T. Ishiguro, M. Shirase, T. Takagi, Efficient Implementation of Pairings on Sensor Nodes, in: Identity Based Encryption Workshop, NIST, 2008. <http://csrc.nist.gov/groups/ST/IBE/documents/June08/Takagi.pdf>. A. Kansal, D. Potter, M. Srivastava, Performance aware tasking for environmentally powered sensor networks, in: Proceedings of SIGMETRICS’04, 2004, pp. 223–234. Kocher, 1996, Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems, 104 Kocher, 1999, Differential power analysis, 388 Kwon, 2010, Secure and efficient broadcast authentication in wireless sensor networks, IEEE Transactions on Computers, 59, 1120, 10.1109/TC.2009.171 A. Liu, P. Kampanakis, P. Ning, TinyECC: Elliptic Curve Cryptography for Sensor Networks (Ver. 0.3), 2005. <http://discovery.csc.ncsu.edu/software/TinyECC/>. Lorincz, 2004, Sensor networks for emergency response: challenges and opportunities, IEEE Pervasive Computing Special Issue on Persive Computing for First Response, 3, 16, 10.1109/MPRV.2004.18 D. Liu, P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in: Proceedings of NDSS’03, 2003, pp. 263–276. Liu, 2004, Multi-level μTESLA: broadcast authentication for distributed sensor networks, ACM Transactions of Embedded Computing Systems, 3, 800, 10.1145/1027794.1027800 D. Liu, P. Ning, S. Zhu, S. Jajodia, Practical broadcast authentication in sensor networks, in: Proceedings of MobiQuitous’05, 2005, pp. 118–132. D. Malan, M. Welsh, M. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: Proceedings of SECON’04, 2004, pp. 71–80. MICA2 Datasheet, 2006. <http://www.xbow.com/Products/Produc_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf>. National Institute of Standards and Technology, Recommended Elliptic Curves for Federal Government Use, August, 1999. Oliveira, 2011, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, Computer Communications, 34, 485, 10.1016/j.comcom.2010.05.013 L.B. Oliveira, D.F. Aranha, E. Morais, F. Daguano, J. Lopez, R. Dahab, TinyTate: computing the Tate pairing in resource-constrained nodes, in: Proceedings of NCA’07, 2007, pp. 318–323. L.B. Oliveira, A. Kansal, B. Priyantha, M. Goraczko, F. Zhao, Secure-TWS: authenticating node to multi-user communication in shared sensor networks, in: Proceedings of IPSN’08, 2009, pp. 289–300. A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of MobiCom’01, 2001, pp. 521–534. Ren, 2009, Multi-user broadcast authentication in wireless sensor networks, IEEE Transactions on Vehicular Technology, 58, 4554, 10.1109/TVT.2009.2019663 Ren, 2007, On broadcast authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 6, 4136, 10.1109/TWC.2007.060255 Shamir, 1985, Identity-based cryptosystems and signature schemes, 47 Szczechowiak, 2009, On the application of pairing based cryptography to wireless sensor networks, 1 P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, R. Dahab. NanoECC: testing the limits of elliptic curve cryptography in sensor networks, in: Proceedings of EWSN’08, LNCS 4913, 2008, pp. 305–320. Tso, 2007, Efficient ID-based digital signatures with message recovery, 47 A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, pervasive computing and communications, in: Proceedings of PerCom’05, 2005, pp. 324–328. H. Wang, Q. Li, Efficient implementation of public key cryptosystems on mote sensors, in: Proceedings of ICICS’06, 2006, pp. 519–528.