An Authentication Scheme Based on the Light-Weight Rainbow Signature for Wireless Sensor Network

Article Preview

Abstract:

Based on the rainbow signature scheme and combining the minus perturbation method of the Shamir, a new light-weight rainbow signature scheme is proposed. This scheme only uses the addition and multiplication operation, so it can be performed easily. This scheme has high security and can resist the minimal rank, rank reduction attacks and oil-vinegar attacks, etc. Based new signature scheme, we also design authentication mechanism for the WSN. According to the characters of the cluster WSN, this authentication mechanism can choose proper authentication parameters to realize the authentication on the cluster WSN by the platform and the authentication between the sensor node and its neighbor nodes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

185-188

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xu J F, Wang Y J. Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network. China Communications, 9(5), 2012, pp.55-63.

Google Scholar

[2] Paulson L C. The Inductive Approach to Verifying Cryptographic Protocols. Journal of computer security, Vol. 6, 1998, pp.85-128.

DOI: 10.3233/jcs-1998-61-205

Google Scholar

[3] Ran C,Hugo K. Analysis of Key-exchange Protocols and Their Use for Building Secure Channels. In proceedings of the Eurocrypt'01, LNCS2005, Springer-Verlag,2001,pp.453-474.

Google Scholar

[4] Ding J, Wolf C, Yang B. I-invertible Cycles for Multivariate Quadratic Public Key Cryptography. In proceedings of Public Key Cryptography, LNCS 4450,Springer, Heidelberg, 2007, pp.266-28.

DOI: 10.1007/978-3-540-71677-8_18

Google Scholar

[5] Shamir A. Efficient Signature Schemes Based on Birational Permutations. In proceedings of Crypo 1993,LNCS, Vol. 773, Berlin: Springver-Verlag, 1993, pp.1-12.

Google Scholar

[6] Yarvis M, Kushalnagar N S. Exploitng Heterogeneity is Sensor Networks. In proceedings of IEEE Infocom 2005,Miami, Fl, March (2005).

Google Scholar

[7] Zhang M, Zhang J, Jin Z Z et al. A Light-Weight Rainbow Signature Scheme for Wireless Sensor Network, Journal of Networks, 7(8), 2012,pp.1272-1279.

Google Scholar

[8] Du X, Xiao Y. Energy Efficient Chessboard Clustering and Routing in Heterogeneous Sensor Networks. Int. Wirel. Mob. Comput?,1(2), 2006, pp.121-130.

Google Scholar

[9] Garey M,Johnson D. Computers and Intractability, A Guide to the Theory of NP-Completeness. New York: Freeman, 1979,pp.128-130.

Google Scholar

[10] Melo E D,Liu M. Analysis of Energy Consumption and Lifetime of Heterogeneous Wireless Sensor Networks. In proceedings of IEEE Globecom Taipei, Taiwan, November (2002).

DOI: 10.1109/glocom.2002.1188034

Google Scholar