吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (2): 465-470.doi: 10.13229/j.cnki.jdxbgxb201402030

• paper • Previous Articles     Next Articles

Lightweight certificateless signature and key agreement scheme for WSNs

WANG Hao, ZHANG Xiao, WANG Ping, ZHANG Yang   

  1. Key Laboratory of Industrial Internet of Things & Networked Control, Ministry of Education, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2012-09-20 Online:2014-02-01 Published:2014-02-01

Abstract:

In this paper, a lightweight certificateless signature scheme is proposed for Wireless Sensor Networks (WSNs) under the condition of limited recourses. The signature scheme is more efficient by using online/offline approach and has no bilinear pairing operation during signing and verifying process compared with the Xirrus Management System (XMS) and Paterson scheme. Based on this signature scheme, a key agreement scheme is also proposed, which can be used by every two nodes in WSN to establish a session key safely. Finally, this signature scheme is proved to be securing that can defense the two attacks proposed in Al-Riyami and Paterson security model, and the security proof can be reduce to discrete logarithm problem.

Key words: computer application, certificateless cryptograph, signature, key agreement, provable security

CLC Number: 

  • TP309

[1] 苏忠, 林闯, 封富军, 等. 无线传感器网络密钥管理的方案与协议[J]. 软件学报, 2007, 18(5): 1218-1231. Su Zhong, Lin Chuang, Feng Fu-jun, et al. Key management scheme and protocols for wireless sensor networks[J].Journal of Software, 2007, 18(5): 1218-1231.



[2] Al-Riyami Sattam S, Paterson Kenneth G. Certificateless public key cryptography[C]//Advance in Cryptography-ASIACRY PT 2003, Berlin:Springer-Verlag, 2003.



[3] 张福泰, 孙银霞, 张磊, 等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6): 1316-1332. Zhang Fu-tai, Sun Yin-xia, Zhang Lei, et al.Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332.



[4] 贾晨军, 廖永建, 陈抗生. 无线传感器网络中的高效签名算法[J]. 电子科技大学学报, 2009, 38(4):537-541. Jia Chen-jun, Liao Yong-jian, Chen Kang-sheng. Efficient signature algorithm in wireless sensor network[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(4):537-541.



[5] 谷科, 贾维嘉, 姜春林. 高效安全的基于身份的签名方[J]. 软件学报, 2011, 22(6): 1350-1360. Gu Ke, Jia Wei-jia, Jiang Chun-lin. Efficient and secure identity-based signature scheme[J]. Journal of Software, 2011, 22(6):1350-1360.



[6] Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in standard model[C]//ACISP, Information Security and Privacy.Berlin: Springer-Verlag, 2006.



[7] Au M H, Chen J, Liu J K, et al. Malicious KGC attacks in certificateless cryptosystems[C]//Computer and Communications Security.New York: ACM, 2007.



[8] 王化群, 徐名海, 郭显久. 几种无证书数字签名方案的安全性分析及改进[J]. 通信学报, 2008, 29(5):88-92. Wang Hua-qun, Xu Ming-hai, Guo Xian-jiu. Cryptanalysis and improvement of several certificateless digital signature[J]. Journal of Communication, 2008, 29(5):88-92.



[9] Rafael C, Ricardo D. Two Notes on the Security of Certificateless Signatures[M]. Berlin: Springer-Verlag, 2007.



[10] Xu S, Mu Y, Susilo W. Online/offline signatures and multisignatures for AODV and DSR routing security[C]//Information Security and Provacy. Berlin:Springer-Verlag, 2006.



[11] 高志刚, 冯登国.高效的标准模型下基于身份认证密钥协商协议[J]. 软件学报, 2011, 22(5):1031-1040. Gao Zhi-gang, Feng Deng-guo. Efficient identity-based authentication key agreement protocol in the standard model[J]. Journal of Software, 2011, 22(5):1031-1040.



[12] 刘文浩, 许春香. 无证书两方密钥协商方案[J].软件学报, 2011, 22(11): 2843-2852. Liu Wen-hao, Xu Chun-xiang. Two party certificateless key agreement schemes[J]. Journal of Software, 2011, 22(11):2843-2852.



[13] Wang Hao-dong, Li Qun. EfⅡcient implementation of public key cryptosystems on mote sensors[C]//Information and Communications Security. Berlin: Springer-Verlag, 2006.



[14] Jaafar Mohd Anuar, Zukarnain Zuriati Ahmad. Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment[J]. European Journal of Scientific Research, 2009, 32(3):430-443.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] YU Yi-cheng, HU Liang, CHI Ling, CHU Jian-feng. Improved anonymous authentication protocol for multi-server architectures [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1586-1592.
[8] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[9] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[10] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[11] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[12] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[13] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[14] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[15] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Song-shan, WANG Qing-nian, WANG Wei-hua, LIN Xin. Influence of inertial mass on damping and amplitude-frequency characteristic of regenerative suspension[J]. 吉林大学学报(工学版), 2013, 43(03): 557 -563 .
[2] CHU Liang, WANG Yan-bo, QI Fu-wei, ZHANG Yong-sheng. Control method of inlet valves for brake pressure fine regulation[J]. 吉林大学学报(工学版), 2013, 43(03): 564 -570 .
[3] LI Jing, WANG Zi-han, YU Chun-xian, HAN Zuo-yue, SUN Bo-hua. Design of control system to follow vehicle state with HIL test beach[J]. 吉林大学学报(工学版), 2013, 43(03): 577 -583 .
[4] HU Xing-jun, LI Teng-fei, WANG Jing-yu, YANG Bo, GUO Peng, LIAO Lei. Numerical simulation of the influence of rear-end panels on the wake flow field of a heavy-duty truck[J]. 吉林大学学报(工学版), 2013, 43(03): 595 -601 .
[5] WANG Tong-jian, CHEN Jin-shi, ZHAO Feng, ZHAO Qing-bo, LIU Xin-hui, YUAN Hua-shan. Mechanical-hydraulic co-simulation and experiment of full hydraulic steering systems[J]. 吉林大学学报(工学版), 2013, 43(03): 607 -612 .
[6] ZHANG Chun-qin, JIANG Gui-yan, WU Zheng-yan. Factors influencing motor vehicle travel departure time choice behavior[J]. 吉林大学学报(工学版), 2013, 43(03): 626 -632 .
[7] MA Wan-jing, XIE Han-zhou. Integrated control of main-signal and pre-signal on approach of intersection with double stop line[J]. 吉林大学学报(工学版), 2013, 43(03): 633 -639 .
[8] YU De-xin, TONG Qian, YANG Zhao-sheng, GAO Peng. Forecast model of emergency traffic evacuation time under major disaster[J]. 吉林大学学报(工学版), 2013, 43(03): 654 -658 .
[9] XIAO Yun, LEI Jun-qing, ZHANG Kun, LI Zhong-san. Fatigue stiffness degradation of prestressed concrete beam under multilevel amplitude cycle loading[J]. 吉林大学学报(工学版), 2013, 43(03): 665 -670 .
[10] XIAO Rui, DENG Zong-cai, LAN Ming-zhang, SHEN Chen-liang. Experiment research on proportions of reactive powder concrete without silica fume[J]. 吉林大学学报(工学版), 2013, 43(03): 671 -676 .