Skip to main content

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks

  • Conference paper
Intelligence and Security Informatics (PAISI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6749))

Included in the following conference series:

  • 646 Accesses

Abstract

In wireless sensor networks, message authentication needs higher computation efficiency and lower communication cost since specific nodes are more vulnerable to various attacks due to the nature of wireless communication in public channel whereas sensor nodes are equipped with limited computing power, storage, and communication modules. Designated verifier signature scheme enables a signer node to convince the designated verifier that a signed message is authentic where neither the signer nor the verifier can convince any other party of authenticity of that message. In this paper, we explore a dual designated verifier signature scheme with message recovery for dual routing paths in a fault-tolerant manner. It supports the redundant routing path based message authentication under a dual route path to the goal base stations. The message is hidden in the signature that protects the privacy of both the sender’s identity and message, thus only designated receivers can extract and verify the message. The proposed scheme can be applied to tiny and short signature requirements for lightweight message authentication in wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aslam, N., Robertson, W., Phillips, W.: Performance analysis of WSN clustering algorithms using discrete power control. IPSI Transactions on Internet Research 5(1), 10–15 (2009)

    Google Scholar 

  2. Cao, X., Kou, W., Dang, L., Zhao, B.: IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications 31(4), 659–667 (2008)

    Article  Google Scholar 

  3. Chow, S.S.M.: Identity-based strong multi-designated verifiers signatures. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 257–259. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Driessen, B., Poschmann, A., Paar, C.: Comparison of innovative signature algorithms for WSNs. In: The First ACM Conference on Wireless Network Security, pp. 30–35. ACM, New York (2008)

    Chapter  Google Scholar 

  5. Eliana, S., Andreas, P.: A survey on secure multipath routing protocols in WSNs. Computer Networks 54(13), 2215–2238 (2010)

    Article  MATH  Google Scholar 

  6. Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based Strong Designated Verifier Signature Revisited. The Journal of Systems and Software 84(1), 120–129 (2011)

    Article  Google Scholar 

  7. Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security 6(1), 82–93 (2008)

    Google Scholar 

  8. Kang, B., Boyd, C., Dawson, E.: Identity-based strong designated verifier signature schemes: attacks and new construction. Computer Electrical Engineering 35(5), 49–53 (2009)

    Article  MATH  Google Scholar 

  9. Lal, S., Verma, V.: Some identity-based strong bi-designated verifiers signature schemes, ePrint/2007/193.pdf (2007)

    Google Scholar 

  10. Lee, J.S., Chang, J.H.: Strong designated verifier signature scheme with message recovery. Advanced Communication Technology 1, 801–803 (2007)

    Article  Google Scholar 

  11. Lee, J.S., Chang, J.H.: Comment on Saeedniia et al.’s strong designated verifier signature scheme. Computer Standards & Interaces 31(1), 258–260 (2009)

    Article  Google Scholar 

  12. Li, B., Batten, M., Doss, R.: Lightweight authentication for recovery in wireless sensor networks. In: 5th Mobile Ad-hoc and Sensor Networks, pp. 465–471 (2009)

    Google Scholar 

  13. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  14. Laguillaumie, F., Vergnaud, D.: Multi-designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated Verifier Signature: Definition, Framework and New Constructions. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1191–1200. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Lipmaa, H., Wang, G., Bao, F.: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 459–471. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Liu, J.K., Baek, J., Zhou, J., Yang, Y., Wong, J.W.: Efficient online/offline edentity-based signature for wireless sensor network. International Journal of Information Security 9(4), 287–296 (2010)

    Article  Google Scholar 

  18. Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: effi-cient conditional privacy preservation protocol for secure vehicular communications. In: Infocom 2008, pp. 15–17 (2008)

    Google Scholar 

  19. Oscar, D.M., Amparo, F.S., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks (2010), doi:10.1016/j.adhoc.2010.08.020

    Google Scholar 

  20. OPEN WSN- An open source multihop sensor network based on arduino (2010), http://www.openwsn.net/index.php

  21. Rjaško, M., Stanek, M.: On designated verifier signature schemes. Cryptology ePrint Archive: Report 2010/191 (2010)

    Google Scholar 

  22. Saeednia, S., Kramer, S., Markovitch, O.: An efficient strong designated verifier signature scheme. In: ICISC 2003. LNCS, vol. 5984, pp. 40–54. Springer, Heidelberg (2003)

    Google Scholar 

  23. Sarma, N., Nandi, S.: A multipath QoS routing with route stability for mobile Ad hoc networks. IETE Technical Review (27), 380–397 (2010)

    Article  Google Scholar 

  24. Sun, B., Li, C.C., Wu, K., Xiao, Y.: A lightweight secure protocol for wireless sensor networks. Computer Communications 29(13-14), 2556–2568 (2006)

    Article  Google Scholar 

  25. Yang, F.Y., Liao, C.M.: A provably secure and efficient strong designated verifier signature scheme. International Journal of Network Security 10(3), 220–224 (2010)

    Google Scholar 

  26. Zubair, Z.A., Baig, Khan, A.I.: A fault-tolerant scheme for detection of DDOS attack pattern in cluster-based wireless sensor networks. In: Sensor and Ad-hoc Network. LNEE, vol. (7), pp. 1–20 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, M., Takagi, T., Yang, B. (2011). Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks. In: Chau, M., Wang, G.A., Zheng, X., Chen, H., Zeng, D., Mao, W. (eds) Intelligence and Security Informatics. PAISI 2011. Lecture Notes in Computer Science, vol 6749. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22039-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22039-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22038-8

  • Online ISBN: 978-3-642-22039-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics