Short Hash-Based Signatures for Wireless Sensor Networks

被引:0
|
作者
Dahmen, Erik [1 ]
Krauss, Christoph [2 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Hochschulstr 10, D-64289 Darmstadt, Germany
[2] Fraunhofer Inst, SIT, Dept Network Secur & Early Warning Syst, D-85748 Garching, Germany
关键词
hash-based signature scheme; hash chain; wireless sensor; network; Winter mtz one-time signature scheme; ELLIPTIC CURVE CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a hash-based signature scheme customized for wireless sensor networks Fol message lengths required by instructions or queries from the base station or single measurements like the temperature e, signature generation is 7 times faster and verification is 158 tunes faster than state-of-the-art implementations of ECDSA at the same security level For message lengths suficient for most sensor network applications; the signature generation tune is comparable to ECDSA, while signature verification remains 20 times faster Our scheme can be used to authenticate messages exchanged between sensor nodes, as well as for securing broadcast authentication. Our scheme minimizes the overhead introduced in the network by the signature venfication done by each sensor before relaying the message
引用
收藏
页码:463 / +
页数:4
相关论文
共 50 条
  • [41] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [42] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA
    Robey, Rachel N.
    Nicholaeff, David
    Robey, Robert W.
    SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
  • [43] Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures
    Suganthi, S. D.
    Anitha, R.
    Thanalakshmi, P.
    DIGITAL CONNECTIVITY - SOCIAL IMPACT, 2016, 679 : 155 - 168
  • [44] Global Optimization for Hash-based Splitting
    Medagliani, Paolo
    Leguay, Jeremie
    Abdullah, Mohammed
    Leconte, Mathieu
    Paris, Stefano
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [45] A Hash-Based Public Key Cryptosystem
    Yin, Qian
    Luo, Gang
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
  • [46] Hash-Based Direct Anonymous Attestation
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600
  • [47] Hash-based dynamic source routing
    Castelluccia, C
    Mutaf, P
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
  • [48] Hash-based Structural Join algorithms
    Mathis, Christian
    Haerder, Theo
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 136 - 149
  • [49] A Secure Scheme for Heterogeneous Wireless Sensor Networks Based on Symmetric Polynomials and Hash Function
    Zhang, Yuquan
    2018 5TH INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (ICTCS 2018), 2018, : 162 - 168
  • [50] Experimental Validation of SLAs in Operational Networks through Hash-based Packet Sampling
    Adami, Davide
    Giordano, Stefano
    Mustacchio, Fabio
    Niccolini, Saverio
    Pagano, Michele
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,