An Improved Aggregate Signature Scheme for Underwater Wireless Sensor Networks
-
摘要: 水下无线传感器网络(UWSN) 是由动态连接节点组成的网络, 其特点为构建战场信息网提供了有利保证。但UWSN数据中心需要对收到的节点消息进行快速验证, 并保证消息不被篡改, 同时保护节点身份和位置的私密性。现有的UWSN采用聚合签名方案实现了消息的快速签名并保证了消息的完整性, 但需要较复杂的模幂运算, 导致了计算复杂度增加, 计算开销提高。针对此问题, 文中提出了一种不使用模幂运算的聚合签名方案, 该方案中信任机构和私钥生成中心根据节点提交的身份标识字符串生成节点临时密钥, 节点利用其临时密钥生成节点假名集、私钥和公钥, 并通过节点假名集和私钥对发送的消息进行签名, 数据中心将收到所有的签名消息进行聚合, 并利用节点公钥对签名进行验证。在计算椭圆曲线离散对数难题(ECDLP)和随机预言机模型假设下, 该方案被证明能够抵抗适应性选择消息攻击和ID攻击下的存在性伪造。与其他传统签名方案相比, 在完成消息快速签名及认证的同时, 该方案具有更高的计算效率, 并且能够保护节点的身份和位置的私密性。
-
关键词:
- 水下无线传感器网络 /
- 聚合签名 /
- 随机预言机模型 /
- 椭圆曲线离散对数难题
Abstract: Underwater wireless sensor networks(UWSN) is a network composed of dynamic connection nodes. Its characteristics provide a favorable guarantee for the construction of battlefield information network. However, it is necessary that data center in UWSN quickly verifies the received messages, ensures that the message is not tampered, and can protect both identity and location privacies of nodes. The existing aggregate signature schemes can achieve rapid verification of messages and ensure integrity of the messages, but they incur high computation and communication overhead because their constructions rely on complex mathematical operations such as modular exponentiation. In this paper, an effective aggregate signature scheme without modular exponentiation is proposed. This scheme is performed by the trust agency(TA) and key generation center(KGC) to generate a temporary secret key(TSK) according to the identity string submitted by the node. On receiving TSK from the KGC, each node generates a set of pseudonym, private key and public key. Then node signs a message using its pseudonym and private key. The data center aggregates all signed messages received and validates the signature using public key of the node. Under the assumption of calculating the elliptic curve discrete logarithm problem (ECDLP) and the random oracle model, the new scheme is proved to be able to resist the existence forgery under adaptive selection message attack and identity document(ID) attack. Compared with other traditional signature schemes, the proposed scheme can provide fast signature and verification of message, have higher computing efficiency, and protect privacy of identity and location of node -
[1] 王静, 陈建峰, 张立杰, 等. 水下无线传感器网络[J]. 声学技术, 2009, 28(1): 89-95.Wang Jing, Chen Jian-feng, Zhang Li-jie, et al. Underwater Sensor Networks[J]. Technical Acoustics, 2009, 28(1): 89-95. [2] Tran K T M, Oh S H. A Data Aggregation Based Efficient Clustering Scheme in Underwater Wireless Sensor Networks[J]. Ubiquitous Information Technologies and Applications Lecture Notes in Electrical Engineering, 2014, 280: 541-548. [3] Goyal N, Dave M, Verma A K. Fuzzy Based Clustering and Aggregation Technique for Under Water Wireless Sensor Networks[C]//2014 International Conference on Electronics and Communication Systems. Sanya, China: ICECS, 2014. [4] Tran K T M, Oh S H, Byun J Y. Well-Suited Similarity Functions for Data Aggregation in Cluster-Based Underwater Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2013, 9(8): 27-40. [5] 韩宁. 水下传感器网络汇聚节点位置隐私保护方法研究[D]. 哈尔滨: 哈尔滨工程大学, 2018. [6] Wan C, Phoha V V, Tang Y. Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge[J]. IEEE Transactions on Vehicular Technology, 2018, 67(2): 1726-1739. [7] Liu J, Han J, Wu L, et al. VDAS: Verifiable Data Aggregation Scheme for Internet of Things[C]//IEEE ICC 2017 AD-HOC and Sensor Networking Symposium. Paris, France: IEEE, 2017. [8] He D, Zeadally S, Xu B, et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(12): 2681- 2691. [9] 吴振国, 祁正华, 王翔. 标准模型下一种高效的基于身份的多签密方案[J]. 计算机技术与发展, 2018, 28(7): 108-112.Wu Zhen-guo, Qi Zheng-hua, Wang Xiang. An Efficient Identity-based Multi-signcryption Scheme in Standard Model[J]. Computer Technology and Development, 2018, 28(7): 108-112. [10] Kamil I, Olakanmi O, Ogundoyin S O. A Secure and Privacy-Preserving Lightweight Authentication Protocol for Wireless Communications[J]. Information Security Journal: A Global Perspective, 2017, 26(6): 287-304. [11] 周彦伟, 杨波, 王青龙. 基于身份的多接收者(多消息)匿名混合签密机制[J]. 软件学报, 2018, 29(2): 442-455.Zhou Yan-Wei , Yang Bo, Wang Qing-Long. Anonymous Hybrid Signcryption Scheme with Multi-Receiver (Multi- Message) Based on Identity[J]. Journal of Software, 2018, 29(2): 442-455.
点击查看大图
计量
- 文章访问数: 221
- HTML全文浏览量: 1
- PDF下载量: 177
- 被引次数: 0