A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN
The sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/5929828 |
id |
doaj-66fe72a276d848868144d0ef9c2f6671 |
---|---|
record_format |
Article |
spelling |
doaj-66fe72a276d848868144d0ef9c2f66712020-11-25T03:04:38ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/59298285929828A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSNChi Yuan0Wenping Chen1Deying Li2School of Information, Renmin University of China, ChinaSchool of Information, Renmin University of China, ChinaSchool of Information, Renmin University of China, ChinaThe sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for the WSN. In this paper, the Hierarchical Matrix Decomposition-based Signcryption (HMDS) algorithm was proposed, which is a kind of identity-based authentication scheme. In HMDS scheme, three-layer architecture, base station (BS), cluster head, and intracluster, is employed to adapt to the common structure of WSN. As the key generation center (KGC), the BS adopts matrix decomposition to generate the identification information and public key for cluster head, which not only reduces the cost of calculation and storage but also avoids the collusion attack. Experiments show that the HMDS algorithm has more advantages over other algorithms and is very suitable for the large-scale WSN.http://dx.doi.org/10.1155/2018/5929828 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chi Yuan Wenping Chen Deying Li |
spellingShingle |
Chi Yuan Wenping Chen Deying Li A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN Wireless Communications and Mobile Computing |
author_facet |
Chi Yuan Wenping Chen Deying Li |
author_sort |
Chi Yuan |
title |
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN |
title_short |
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN |
title_full |
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN |
title_fullStr |
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN |
title_full_unstemmed |
A Hierarchical Matrix Decomposition-Based Signcryption without Key-Recovery in Large-Scale WSN |
title_sort |
hierarchical matrix decomposition-based signcryption without key-recovery in large-scale wsn |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
The sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for the WSN. In this paper, the Hierarchical Matrix Decomposition-based Signcryption (HMDS) algorithm was proposed, which is a kind of identity-based authentication scheme. In HMDS scheme, three-layer architecture, base station (BS), cluster head, and intracluster, is employed to adapt to the common structure of WSN. As the key generation center (KGC), the BS adopts matrix decomposition to generate the identification information and public key for cluster head, which not only reduces the cost of calculation and storage but also avoids the collusion attack. Experiments show that the HMDS algorithm has more advantages over other algorithms and is very suitable for the large-scale WSN. |
url |
http://dx.doi.org/10.1155/2018/5929828 |
work_keys_str_mv |
AT chiyuan ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn AT wenpingchen ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn AT deyingli ahierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn AT chiyuan hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn AT wenpingchen hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn AT deyingli hierarchicalmatrixdecompositionbasedsigncryptionwithoutkeyrecoveryinlargescalewsn |
_version_ |
1724680656026337280 |