Short Online/Off-line Signature Scheme for Wireless Sensor Networks

Short Online/Off-line Signature Scheme for Wireless Sensor Networks

Anser Ghazzaal Ali Alquraishee (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Jayaprakash Kar (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia) and Naomie Salim (Faculty of Computing Universiti Teknologi Malaysia, Sekudai, Malaysia)
Copyright: © 2015 |Pages: 15
DOI: 10.4018/IJISP.2015010103
OnDemand PDF Download:
No Current Special Offers


This article proposes a novel construction of short Online/Off-line signature scheme with provable security in the random oracle model for wireless sensor network (WSN). Security of the proposed scheme relies on k-CAA Problem as well as Computational Diffie-Hellman problem and is resistant against chosen message attack. The scheme is suited for broadcast authentication and integrity of message exchanging between the sensor nodes. The process of generation of the signature is carried out in two phases online and off-line. The heavy computation is performed in off-line phase, i.e the base station. The actual signature will be generated in the sensor nodes. The authors assume that the online phase is more efficient. Here they have evaluated the size of the signature with respect to the size of the user's public key and compare with some current schemes. Also, the authors have evaluated the computational cost and time which shows the scheme is most suited to implement on sensor node.
Article Preview

1. Introduction

Recently Wireless sensor networks (WSNs) have brought forth a wide range of attention to the research community. One of the significant obstacles is the deployment of the smart sensor node where it is encountered by many malicious attackers. Therefore, it's a very great challenge to the research community to achieve integrity of the sensitive information. Also, while transmitting the information from one node to another based on some local decision process, the node should not deny that, has not sent the information later on i.e. non-repudiation. In order to achieve the security goals, integrity and non-repudiation an efficient signature scheme is to deploy (J.Kar, 2012). The smart sensors are very tiny having limited powers designed with single or multiple sensors. These are low-cost as compared to the conventional sensors. The ability of the sensor nodes is they can measure, sense and collect information from the environments.

Wireless sensor network (WSN) is defined as a compact micro sensor that has wireless commutation ability. The improvements of the wireless commutation technologies have increased the development of wireless sensor network now they can use lower power and they are small in size. Generally, the deployment of WSN system is in a hostile environment where the probabilities of occurring threats are more. It is a challenge to the research community to protect the information as well as established authentication and integrity in the data. Due to various inherent restrictions like limited storage, low powers, short communications overhead, many cryptographic protocols include key establishment, digital signature, mutual authentication between two adjacent nodes have been proposed by different authors. However, these protocols have lack of security proof and have vulnerabilities. In order to achieve integrity and non-repudiation, we propose an Online/Off-line signature scheme with provable security. Generation of signature is performed in two phases online and off-line. Further, to reduce the communications overhead, we develop a short signature scheme. All heavy computations are performed in off line phase where it does not depend upon the message to be signed. Other light computations are performed in online, phase, so that overall computational cost is very less. Hence it is suited to implement on WSN systems. Wireless sensor networks comprise of tiny nodes known as motes that monitor environmental as well as physical conditions such as temperature, sound, vibration etc. Data are stored and processed in the motes. After processing, it communicates through wireless links (J.Kar, 2014; M.Bellare & P.Rogaway, 1996) . WSN systems comprise a base station communicates with a number of wireless sensors present nearby by use of a radio link. Once the data is composed by some transitional node, it is then compressed by ZIP algorithm, and directly communicated to the gateway. If the communication link is not direct, it uses other sensor nodes to pass data to the gateway. After receiving the data at the base station then it is accessible to the system by the connection of gateway (J.Kar, 2014).

1.1. Motivation and Contribution

The motivation of the paper is to construct a short signature scheme and is set up a framework to implement on wireless sensor network that establish node-to node authentication. In addition, it achieves message integrity and non-repudiation. We computed the size of the signature and compare with the schemes that has been proposed currently. The scheme has been proven that it is secure against adaptive chosen message attack. We have motivated that, since the signature is of shorter length, it is suited to implement on wireless sensor network.

Complete Article List

Search this Journal:
Open Access Articles
Volume 16: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 15: 4 Issues (2021): 2 Released, 2 Forthcoming
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing