IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Comment on Saeednia et al.'s strong designated verifier signature scheme
Computer Standards & Interfaces
Identity-based strong designated verifier signature schemes: Attacks and new construction
Computers and Electrical Engineering
A lightweight secure protocol for wireless sensor networks
Computer Communications
Lightweight Authentication for Recovery in Wireless Sensor Networks
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient online/offline identity-based signature for wireless sensor network
International Journal of Information Security
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Identity-based strong multi-designated verifiers signatures
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Designated verifier signature: definition, framework and new constructions
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
In wireless sensor networks, message authentication needs higher computation efficiency and lower communication cost since specific nodes are more vulnerable to various attacks due to the nature of wireless communication in public channel whereas sensor nodes are equipped with limited computing power, storage, and communication modules. Designated verifier signature scheme enables a signer node to convince the designated verifier that a signed message is authentic where neither the signer nor the verifier can convince any other party of authenticity of that message. In this paper, we explore a dual designated verifier signature scheme with message recovery for dual routing paths in a fault-tolerant manner. It supports the redundant routing path based message authentication under a dual route path to the goal base stations. The message is hidden in the signature that protects the privacy of both the sender's identity and message, thus only designated receivers can extract and verify the message. The proposed scheme can be applied to tiny and short signature requirements for lightweight message authentication in wireless sensor networks.