A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie–Hellman assumption in random oracle model.

[1]  Kefei Chen,et al.  An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .

[2]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[3]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[4]  Lei Zhang,et al.  Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.

[5]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[6]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[7]  Robert H. Deng,et al.  An Efficient Privacy-Preserving Outsourced Computation over Public Data , 2017, IEEE Transactions on Services Computing.

[8]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  C. L. Philip Chen,et al.  Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..

[10]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.

[11]  Xiaodong Lin,et al.  Fine-grained data sharing in cloud computing for mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[12]  C. Pandu Rangan,et al.  Identity based partial aggregate signature scheme without pairing , 2012, 2012 35th IEEE Sarnoff Symposium.

[13]  Limin Shen,et al.  Notes on the security of certificateless aggregate signature schemes , 2014, Inf. Sci..

[14]  Nuno Pereira,et al.  Efficient Aggregate Computations in Large-Scale Dense WSN , 2009, 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium.

[15]  Matthew Green,et al.  Synchronized aggregate signatures: new definitions, constructions and applications , 2010, CCS '10.

[16]  Didier Dubois,et al.  Suitable Properties for Any Electronic Voting System , 2006, Artificial Intelligence and Law.

[17]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[18]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[19]  Dengguo Feng,et al.  ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.

[20]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.

[21]  Kefei Chen,et al.  Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[22]  Jianfeng Ma,et al.  Efficient attribute based sequential aggregate signature for wireless sensor networks , 2014, Int. J. Sens. Networks.

[23]  Xiaohui Liang,et al.  EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.

[24]  E. Hargittai Is Bigger Always Better? Potential Biases of Big Data Derived from Social Network Sites , 2015 .

[25]  Ryu Miura,et al.  Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks , 2014, IEEE Transactions on Emerging Topics in Computing.

[26]  Incheon Paik,et al.  Big Data Infrastructure for Active Situation Awareness on Social Network Services , 2013, 2013 IEEE International Congress on Big Data.

[27]  Xian Wang,et al.  An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks , 2015, Inf. Sci..

[28]  Qiaoyan Wen,et al.  On the security of a certificateless aggregate signature scheme , 2013, IACR Cryptol. ePrint Arch..

[29]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[30]  Ma,et al.  An Aggregate Signature Scheme with Specified Verifier , 2011 .

[31]  Zhi Guan,et al.  An efficient certificateless aggregate signature with constant pairing computations , 2013, Inf. Sci..

[32]  Javier Herranz,et al.  Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..

[33]  Zuhua Shao,et al.  Enhanced Aggregate Signatures from Pairings , 2005, CISC.

[34]  Hovav Shacham,et al.  Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.

[35]  Xiaojun Cao,et al.  Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects , 2014, IEEE Internet of Things Journal.

[36]  Craig Gentry,et al.  Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.

[37]  Charles Lynn,et al.  Secure Border Gateway Protocol (Secure-BGP) , 2000 .

[38]  Xiaolei Dong,et al.  Identity based signature scheme based on cubic residues , 2011, Science China Information Sciences.

[39]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[40]  Wakaha Ogata,et al.  Certificateless Aggregate Signature Schemes with Improved Security , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[41]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[42]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[43]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[44]  Renan C. A. Alves,et al.  Assisting Physical (Hydro)Therapy With Wireless Sensors Networks , 2015, IEEE Internet of Things Journal.

[45]  B. Mukherjee,et al.  Analysis of a prediction-based mobility adaptive tracking algorithm , 2005, 2nd International Conference on Broadband Networks, 2005..

[46]  Craig Gentry,et al.  Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.

[47]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[48]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[49]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[50]  Jin Li,et al.  Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature , 2007, ProvSec.

[51]  Jianhua Chen,et al.  Insecurity of an efficient certificateless aggregate signature with constant pairing computations , 2014, Inf. Sci..