Journal of Jilin University(Engineering and Technology Edition) ›› 2019, Vol. 49 ›› Issue (5): 1676-1681.doi: 10.13229/j.cnki.jdxbgxb20190301

Previous Articles    

Digital signature scheme against internal and external attack for wireless sensor networks

Bin-bin YU1,2(),Liang HU1,Ling CHI1()   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun, 130012
    2. College of Computer Science and Technology, Beihua University, Jilin 132013
  • Received:2019-04-01 Online:2019-09-01 Published:2019-09-11
  • Contact: Ling CHI E-mail:yubb11@mails.jlu.cn;chiling@jlu.edu.cn

Abstract:

This paper puts forward a digital signature based on discrete logarithm and hash function. After security analyzing, the proposal has the resistance to IEAs based on discrete logarithm and hash function. After performance analysis, the memory occupancy of wireless sensor nodes was effectively reduced by the signature scheme presented in this paper.

Key words: computer system architecture, digital signature, discrete logarithm, hash function, wireless sensor network

CLC Number: 

  • TP393

Table 1

Parameters in our scheme"

参数描 述
IDr无线传感器节点标识
Mrr轮传递的信息
H()hash函数
si一个随机生成的大整数
pisi的逆元
n一个大整数
gsi一系列秘密信息
MACir一个签名
Ranr一个随机生成的大整数
Secr一个传递的秘密信息
Tr当前的时间戳
ackr回执信息

Fig.1

Process of our scheme"

Table 2

Comparison of cost"

方 案签名阶段验证阶段
文献[6]2hash2Tbp+1Th
文献[8]2hash4Tbp+1Th
文献[9]1Te+2Th1Te+2Th
本文2Te+1Th2Te+1Th
1 CullerD, EstrinD, SrivastavaM. Guest editors’ introduction: overview of sensor networks[J].IEEE Computer, 2002, 37(8): 41-49.
2 任丰原, 黄海宁, 林闯. 无线传感器网络[J]. 软件学报, 2003, 14(7): 1282-1291.
RenFeng-yuan, HuangHai-ning, LinChuang. Wireless sensor networks[J]. Journal of Software, 2003, 14(7): 1282-1291.
3 雷丽婷. 面向无线通信的认证及密钥协商机制研究[D]. 成都: 西南交通大学计算机科学与技术学院, 2015.
LeiLi-ting. The reseearch of authentication and key exchange mechanism for wireless communication[D]. Chengdu: School of Information Science and Technology, Southwest Jiaotong University, 2015.
4 王海勇. 无线传感器网络数据可靠传输关键技术研究[D]. 南京: 南京邮电大学计算机学院, 2017.
WangHai-yong. Research on key technology of data reliable transimission in wireless sendor networks[D]. Nanjing: School of Computer Science, Nanjing University of Posts and Telecommunications, 2017.
5 DiffieW, HellmanM E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
6 HeD, WangD. Robust biometrics-based authentication scheme for multi-server environment[J]. IEEE Systems Journal, 2015, 9(3): 816-823.
7 XueK, MaC, HongP, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013, 36(1): 316-323.
8 LinH Y. Location-based data encryption for wireless sensor network using dynamic keys[J]. Wireless Networks, 2015, 21(8): 2649-2656.
9 于斌斌, 武欣雨, 初剑峰, 等. 基于群密钥协商的无线传感器网络签名协议[J]. 吉林大学学报: 工学版, 2017, 47(3): 924-929.
YuBin-bin, WuXin-yu, ChuJian-feng, et al. Signature protocol for wireless sensor network based on group key agreement[J]. Journal of Jilin University (Engineering and Technology Edition), 2017, 47(3): 924-929.
10 马爽. 抗共谋攻击的终端设备位置校验协议[D]. 西安: 西安电子科技大学计算机科学与技术学院, 2018.
MaShuang. A terminal location verification protocol for collision attack[D]. Xi’an: School of Computer Science and Technology, Xidian University, 2018.
11 Turkanovi´cM, BrumenB, HölblM. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion[J]. Ad Hoc Networks, 2014, 20: 96-112.
[1] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[2] LIU Zhou-zhou, PENG Han. Topology control algorithm based on node reliability in WSN [J]. 吉林大学学报(工学版), 2018, 48(2): 571-577.
[3] TANG Kun, SHI Rong-hua. Detection of wireless sensor network failure area based on butterfly effect signal [J]. 吉林大学学报(工学版), 2017, 47(6): 1939-1948.
[4] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[5] DONG Ying, ZHOU Zhan-ying, SU Zhen-zhen, XU Yang, QIAN Zhi-hong. Cross-layer MAC protocol based on routing information for WSN [J]. 吉林大学学报(工学版), 2017, 47(2): 647-654.
[6] HAO Ping-ting, HU Liang, JIANG Jing-yan, CHE Xi-long. Optimistic lock protocol of multi-managed nodes [J]. 吉林大学学报(工学版), 2017, 47(1): 227-234.
[7] WEI Xiao-hui, LIU Zhi-liang, ZHUANG Yuan, LI Hong-liang, LI Xiang. Adaptive checkpoint mechanism supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2017, 47(1): 199-207.
[8] ZHU Hai-yang, ZHANG He, MA Shao-jie. Parameter optimization of enhanced ultrasonic circumferential scanning node in WSN [J]. 吉林大学学报(工学版), 2017, 47(1): 262-267.
[9] LIU Zhou-zhou, WANG Fu-bao. Improvement of discrete shuffled frog-leaping algorithm and application in compressed sensing reconstruction [J]. 吉林大学学报(工学版), 2016, 46(4): 1261-1268.
[10] ZHANG Jing, LIU Yan-heng, ZHANG Jin-dong, SUN Geng. Cluster size adaptive adjustable strategy for wireless sensor networks [J]. 吉林大学学报(工学版), 2016, 46(3): 876-883.
[11] TENG Zhi-jun, ZHANG Fan, SONG Ming-hui. Wireless sensor network energy balance ant colony routing algorithm [J]. 吉林大学学报(工学版), 2016, 46(1): 327-332.
[12] SONG Xiao-ying, WEN Tao, GUO Quan, ZHANG Dong-qing, SHENG Gang. Unequal cluster data gathering protocol with optimal cluster size in sensor networks [J]. 吉林大学学报(工学版), 2015, 45(6): 1961-1973.
[13] WANG Li-ding, YUE Guo-dong, XU Zheng, LIU Chong, CHEN Yi, ZHAO Yue-xuan, WANG Tian-rao. Architecture and performance test of wireless sensor network system for distributed stress monitoring in high-speed railway track [J]. 吉林大学学报(工学版), 2015, 45(6): 1974-1979.
[14] LIU Kui, LIU San-yang. Mobile data collecting algorithm based on mixed sink strategy in WSNs [J]. 吉林大学学报(工学版), 2015, 45(5): 1680-1687.
[15] FENG Xiao-ning, WANG Zhuo, ZHANG Xu. Formal method for routing protocol of WSN based on L-π calculus [J]. 吉林大学学报(工学版), 2015, 45(5): 1565-1571.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!