Enhanced aggregate signature scheme for secure data verification in wireless sensor network

Rentala Mounika, Nadella Sunil


In tangible, the wireless sensor networks have been approximately practical, such as target tracking and environment remote monitoring. But, data can be simply bargained by a huge of doses, such as data capture and data meddling, etc. In this paper, we chiefly effort on data integrity protection, give an identity-based aggregate signature outline with a voted verifier for wireless sensor networks. Bestowing to the improvement of aggregate signatures, our outline not only can preserve data integrity, but also can condense bandwidth and storage cost for wireless sensor networks. Moreover, the security of our identity-based aggregate signature organization is carefully open based on the computational Diffie-Hellman conjecture in unsystematic vision typical.


I. Paik, T. Tanaka, H. Ohashi and W. Chen, “Big Data Infrastructure for Active Situation Awareness on Social Network Services,” Big Data (Big Data Congress), 2013 IEEE International Congress on. IEEE, pp. 411-412, 2013.

E. Hargittai, “Is Bigger Always Better? Potential Biases of Big Data Derived from Social Network Sites,” Annals of the American Academy of Political & Social Science, vol. 659, no. 1, pp. 63-76, 2015.

Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Sup-porting Parallel Computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.

I. Hashem, I. Yaqoob, N. Anuar, et al., “The rise of “big data” on cloud computing: Review and open research issues,” Information Systems, vol. 47, no. 47, pp. 98-115, 2015.

H. Li, Y. Yang, T. Luan, X. Liang, L. Zhou and X. Shen, “Enabling Fine grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, DOI10.1109/TDSC.2015.2406704, 2015.

H. Li, D. Liu, Y. Dai and T. Luan, “Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74-80, 2015.

X. Liu, B. Qin, R. Deng, Y. Li, “An Efficient Privacy-Preserving Out-sourced Computation over Public Data,” IEEE Transactions on Services Computing, 2015, doi: 10.1109/TSC.2015.2511008

X. Liu, R. Choo, R. Deng, R. Lu, “Efficient and privacy-preserving out-sourced calculation of rational numbers,” IEEE Transactions on Depend-able and Secure Computing, 2016, doi: 10.1109/TDSC.2016.2536601.

H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no.8, pp. 2053-2064, 2014.

H. Li, R. Lu, L. Zhou, B. Yang, X. Shen, “An Efficient Merkle Tree Based Authentication Scheme for Smart Grid,” IEEE SYSTEMS Journal, vol. 8, no.2, pp. 655-663, 2014.

C. Chen, C. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data,” Information Sciences, vol. 275, no. 11, pp. 314-347, 2014.

D. Takaishi, H. Nishiyama, N. Kato and R. Miura, “Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks,” Emerging Topics in Computing IEEE Transactions on, vol. 2, no. 3, pp.388-397, 2014.

M.M.E.A. Mahmoud and X. Shen, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,” IEEE Trans. Parallel Distrib.Syst., vol. 23, no. 10, pp. 1805-1818, 2012.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Commun.Mag., vol. 40, no. 8, pp. 102-114, 2002.

J. Yick, B. Mukherjee and D. Ghosal, “Analysis of a prediction-based mobility adaptive tracking algorithm,” in Proc. Broadband Networks, 2nd International Conference on, IEEE, pp. 753-760, 2005.

Limin Shen, Jianfeng Ma, Member, IEEE, Ximeng Liu, Member, IEEE, Fushan Wei and Meixia Miao, A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Network, 2017.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.