ID-Based Data Integrity Scheme Using Cluster Method For Wireless Sensor Networks

Authors

  • M. Mohammed Mohiddin  JNTUA College of Engineering, Ananthapuramu, Andhra Pradesh, India

Keywords:

Wireless Sensor Network, Id-based Cryptography, Data Aggregation, Aggregate Signature, Data Integrity, Coalition Attack, Elliptic Curve Cryptography, Verifier, Encryption, Decryption.

Abstract

The main goal of the data aggregation schemes in wireless sensor networks is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. However, the technique still has the inherent security problems and can be easily compromised by a vast of attacks, such as reply attacks, data interception and data tampering, etc. Hence, the goal is to design a secure and efficient data integrity scheme, given an Identity-based aggregate signature with a designated verifier for wireless sensor networks. In this model the sensor nodes are grouped into clusters for efficient data transmission, Clustering is an effective way to enhance the system performance of wireless sensor networks. This model can not only keep data integrity but also can reduce bandwidth and storage cost for wireless sensor networks. The security of this scheme is provably secure in the random oracle model under the computational Diffie–Hellman assumption.

References

  1. J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey,"Computer Networks, vol. 52, pp. 2292-2330, 2008.
  2. D. Boneh, C. Gentry, B. Lynn and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps", in Proc. Eurocrypt 2003, Warsaw, Poland. LNCS, pp. 416-432, 2003.
  3. F. Zhang, L. Shen and G. Wu, "Notes on the security of certificateless aggregate signature schemes," Information Sciences, vol. 287, pp. 32-37, 2014.
  4. A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc .CRYPTO 1984, Santa Barbara, California, USA, August 19-22,Springer-Verlag, Berlin LNCS, vol. 196, pp. 47-53, 1984.
  5. S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: ASIACRYPT 2003, LNCS, vol. 2894, 2003, pp. 452?473.
  6. L. Zhang, B. Qin, Q. Wu and F. Zhang, "Efficient many-to-one authentication with certificateless aggregate signatures," Computer Networks, vol.
  7. 54, no. 14, pp. 2482-2491, 2010.
  8. H. Xiong, Z. Guan, Z. Chen and F. Li, "An efficient certificateless? aggregate signature with constant pairing computations," Information Sciences, vol. 219, no. 10, pp. 225-235, 2013.
  9. F. Zhang, L. Shen and G. Wu, "Notes on the security of certificateless aggregate signature schemes," Information Sciences, vol. 287, pp. 32-37,2014.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
M. Mohammed Mohiddin, " ID-Based Data Integrity Scheme Using Cluster Method For Wireless Sensor Networks , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 8, pp.983-989, November-December-2017.