A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN

The sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for...

Full description

Bibliographic Details
Main Authors: Chi Yuan, Wenping Chen, Deying Li
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/5929828
id doaj-66fe72a276d848868144d0ef9c2f6671
record_format Article
spelling doaj-66fe72a276d848868144d0ef9c2f66712020-11-25T03:04:38ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/59298285929828A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSNChi Yuan0Wenping Chen1Deying Li2School of Information, Renmin University of China, ChinaSchool of Information, Renmin University of China, ChinaSchool of Information, Renmin University of China, ChinaThe sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for the WSN. In this paper, the Hierarchical Matrix Decomposition-based Signcryption (HMDS) algorithm was proposed, which is a kind of identity-based authentication scheme. In HMDS scheme, three-layer architecture, base station (BS), cluster head, and intracluster, is employed to adapt to the common structure of WSN. As the key generation center (KGC), the BS adopts matrix decomposition to generate the identification information and public key for cluster head, which not only reduces the cost of calculation and storage but also avoids the collusion attack. Experiments show that the HMDS algorithm has more advantages over other algorithms and is very suitable for the large-scale WSN.http://dx.doi.org/10.1155/2018/5929828
collection DOAJ
language English
format Article
sources DOAJ
author Chi Yuan
Wenping Chen
Deying Li
spellingShingle Chi Yuan
Wenping Chen
Deying Li
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
Wireless Communications and Mobile Computing
author_facet Chi Yuan
Wenping Chen
Deying Li
author_sort Chi Yuan
title A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
title_short A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
title_full A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
title_fullStr A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
title_full_unstemmed A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
title_sort hierarchical matrix decomposition-based signcryption without key-recovery in large-scale wsn
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description The sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for the WSN. In this paper, the Hierarchical Matrix Decomposition-based Signcryption (HMDS) algorithm was proposed, which is a kind of identity-based authentication scheme. In HMDS scheme, three-layer architecture, base station (BS), cluster head, and intracluster, is employed to adapt to the common structure of WSN. As the key generation center (KGC), the BS adopts matrix decomposition to generate the identification information and public key for cluster head, which not only reduces the cost of calculation and storage but also avoids the collusion attack. Experiments show that the HMDS algorithm has more advantages over other algorithms and is very suitable for the large-scale WSN.
url http://dx.doi.org/10.1155/2018/5929828
work_keys_str_mv AT chiyuan ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
AT wenpingchen ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
AT deyingli ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
AT chiyuan hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
AT wenpingchen hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
AT deyingli hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn
_version_ 1724680656026337280