期刊文献+

Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network 被引量:1

Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network
原文传递
导出
摘要 Identity-based cryptography (IBC) has drawn a lot of attentions in delay tolerant environment. However, the high computational cost of IBC becomes the most critical issue in delay tolerant mobile sensor network (DTMSN) because of the limited processing power. In this paper, an efficient identify-based signature scheme with batch authentication (ISBA) is proposed for DTMSN. ISBA designs an online/offline signature with batch authentication to reduce the computational cost, and improves data delivery mechanism to increase the number of messages for each batch authentication. Simulation results show that ISBA not only realizes a lower computational cost than existed schemes, but also does not induce negative impact on the delivery performance. Identity-based cryptography (IBC) has drawn a lot of attentions in delay tolerant environment. However, the high computational cost of IBC becomes the most critical issue in delay tolerant mobile sensor network (DTMSN) because of the limited processing power. In this paper, an efficient identify-based signature scheme with batch authentication (ISBA) is proposed for DTMSN. ISBA designs an online/offline signature with batch authentication to reduce the computational cost, and improves data delivery mechanism to increase the number of messages for each batch authentication. Simulation results show that ISBA not only realizes a lower computational cost than existed schemes, but also does not induce negative impact on the delivery performance.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第4期80-86,共7页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (61070204, 61101108, 61121061) The National S&T Major Program of China (2011ZX03002-005-01)
关键词 IBC DTMSN SIGNATURE batch authentication computational cost IBC, DTMSN, signature, batch authentication, computational cost
  • 相关文献

参考文献2

二级参考文献2

共引文献29

同被引文献14

  • 1J Miao, et al. An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing [ J ]. Interna- tional Journal of Information Management, 2013,33:252 -262.
  • 2L Dong, et al. Opportunistic media access control and routing for delay - tolerant mobile ad hoc networks [ J ]. Wireless Networks, 2012,18(8) ::949 -965.
  • 3O Hasan, et al. A Privacy Preserving Prediction - based Routing Protocol for Mobile Delay Tolerant Networks[ C]. //Advanced In- formation Networking and Applications (AINA), 2013 IEEE 27th International Conference on. IEEE, 2013:546 - 553.
  • 4W Xinhua, et al. A Ranking Information Forwarding Algorithm with Social Characteristic in Mobile Delay Tolerant Network [ C ]. Mobile Ad- hoc and Sensor Networks (MSN), 2013 IEEE Ninth International Conference on. IEEE, 2013:89-94.
  • 5W Li, et al. Efficient identity - based signature scheme with batch authentication for delay tolerant mobile sensor network [ J ]. The Journal of China Universities of Posts and Telecommunications, 2013.20:80 - 86.
  • 6Peng Wei, Dong Guohua, Yang Kun. Random Road Network Model and Its Effectson Topological Characteristics of Mobile De- lay- Tolerant Networks[ J]. IEEE Transactions on Mobile Com- puting, 2014,13 ( ( 12 ) :2706 - 2718.
  • 7Lucile Sassatelli, Arshad Ali, Manoj Panda. Reliable Transport in Delay -Tolerant Networks With Opportunistic Routing [ J]. IEEE Transactions on Wireless Communications, 2014,13 (10) : 5546 - 5557.
  • 8You Lei, Li Jianbo, Wei Changjiang. MPAR: A movement pat- tern - aware optimal muting for social delay tolerant networks [J]. Ad Hoc Networks, 2015,24:228 -249.
  • 9Z Xu, W Liang, Y Xu. Network Lifetime Maximization in Delay -Tolerant Sensor Networks with a Mobile Sink[ C ]. Distributed Computing in Sensor Systems (DCOSS) , 2012 IEEE 8th Interna- tional Conference on. IEEE, 2012:9 - 16.
  • 10Zeng Ying - pei, Cao Jian - nong, Shi - geng Zhang. Random - walk based approach to detect clone attacks in wireless sensor networks[J]. IEEE Journal on Selected Areas in Communica- tions, 2010,28(5) : 677 -691.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部