DocumentCode :
504035
Title :
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks
Author :
Yavuz, Attila Altay ; Ning, Peng
Author_Institution :
Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
fYear :
2009
fDate :
13-16 July 2009
Firstpage :
1
Lastpage :
10
Abstract :
Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors) and receivers (e.g., mobile data collectors, static sinks). The lack of real-time communication forces sensors to accumulate the sensed data possibly for long time periods, along with the corresponding signatures for authentication purposes. Moreover, non-real-time characteristic of UWSNs makes sensors vulnerable especially to active adversaries, which compromise sensors and extract all data stored in them. Hence, it is critical to have forward security property such that even if the adversary can compromise the current keying materials, she cannot modify or forge authenticated data generated before the node compromise. Forward secure and aggregate signatures are cryptographic primitives developed to address these issues. Unfortunately, existing forward secure and aggregate signature schemes either impose substantial computation and storage overhead, or do not allow public verifiability, thereby impractical for resource-constrained UWSNs. In order to address these problems, we propose a new class of signature schemes, which we refer to as Hash-Based Sequential Aggregate and Forward Secure Signature (HaSAFSS). Such a scheme allows a signer to sequentially generate a compact, fixed-size, and publicly verifiable signature at a nearly optimal computational cost. We propose two HaSAFSS schemes, symmetric HaSAFSS (Sym-HaSAFSS) and Elliptic Curve Cryptography (ECC) based HaSAFSS (ECC-HaSAFSS). Both schemes integrate the efficiency of MAC-based aggregate signatures and the public verifiability of bilinear map based signatures by preserving forward security via Timed-Release Encryption (TRE). We demonstrate that our schemes are secure under appropriate computational assumptions. We also show that our schemes are significantly more efficient in terms of both computational an- d storage overheads than previous schemes, and therefore quite practical for even highly resource-constrained UWSN applications.
Keywords :
digital signatures; public key cryptography; telecommunication security; wireless sensor networks; continuous real-time communication; elliptic curve cryptography; forward secure signature; forward security property; hash-based sequential aggregate; timed-release encryption; unattended wireless sensor network; Aggregates; Authentication; Computational efficiency; Data mining; Data security; Elliptic curve cryptography; Mobile communication; Secure storage; Sensor phenomena and characterization; Wireless sensor networks; Unattended Wireless Sensor Networks (UWSNs); digital signatures; forward security; security and privacy; signature aggregation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, 2009. MobiQuitous '09. 6th Annual International
Conference_Location :
Toronto, ON
Print_ISBN :
978-963-9799-59-2
Type :
conf
DOI :
10.4108/ICST.MOBIQUITOUS2009.6824
Filename :
5326402
Link To Document :
بازگشت