A Secure Data Transmission Using Efficient Aggregate Signature Scheme to Verify Data in Wireless Sensor N/W

Ganti Dinesh Kumar, G K Havilah, M. Veerabhadra Rao

Abstract


We stretch an ID-based aggregate signature (IBAS) scheme for WSNs in cluster-based method . The opponent in our refuge model has the competence to presentation any alliance attacks. If an opponent can use some solitary signatures counting invalid ones to make a valid aggregate signature approximately that the attack is successful. In detail, our ID-based aggregate signature scheme not only can defend data integrity, but also can lessen bandwidth and storage cost for WSNs. we largely attention on data integrity shield, give an identity-based aggregate signature scheme with a selected verifier for wireless sensor networks. Outline not only can keep data integrity, but also can cut bandwidth and storage cost for wireless sensor networks.


References


I. Paik, T. Tanaka, H. Ohashi and W. Chen, “Big Data Infrastructure for Active Situation Awareness on Social Network Services,” Big Data (Big Data Congress), 2013 IEEE International Congress on. IEEE, pp. 411-412, 2013.

E. Hargittai, “Is Bigger Always Better? Potential Biases of Big Data Derived from Social Network Sites,” Annals of the American Academy of Political & Social Science, vol. 659, no. 1, pp. 63-76, 2015.

Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Sup-porting Parallel Computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.

I. Hashem, I. Yaqoob, N. Anuar, et al., “The rise of “big data” on cloud computing: Review and open research issues,” Information Systems, vol. 47, no. 47, pp. 98-115, 2015.

H. Li, Y. Yang, T. Luan, X. Liang, L. Zhou and X. Shen, “Enabling Fine grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, DOI10.1109/TDSC.2015.2406704, 2015.

H. Li, D. Liu, Y. Dai and T. Luan, “Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74-80, 2015.

X. Liu, B. Qin, R. Deng, Y. Li, “An Efficient Privacy-Preserving Out-sourced Computation over Public Data,” IEEE Transactions on Services Computing, 2015, doi: 10.1109/TSC.2015.2511008

X. Liu, R. Choo, R. Deng, R. Lu, “Efficient and privacy-preserving out-sourced calculation of rational numbers,” IEEE Transactions on Depend-able and Secure Computing, 2016, doi: 10.1109/TDSC.2016.2536601.

H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no.8, pp. 2053-2064, 2014.

H. Li, R. Lu, L. Zhou, B. Yang, X. Shen, “An Efficient Merkle Tree Based Authentication Scheme for Smart Grid,” IEEE SYSTEMS Journal, vol. 8, no.2, pp. 655-663, 2014.

C. Chen, C. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data,” Information Sciences, vol. 275, no. 11, pp. 314-347, 2014.

D. Takaishi, H. Nishiyama, N. Kato and R. Miura, “Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks,” Emerging Topics in Computing IEEE Transactions on, vol. 2, no. 3, pp.388-397, 2014.

M.M.E.A. Mahmoud and X. Shen, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,” IEEE Trans. Parallel Distrib.Syst., vol. 23, no. 10, pp. 1805-1818, 2012.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Commun.Mag., vol. 40, no. 8, pp. 102-114, 2002.

J. Yick, B. Mukherjee and D. Ghosal, “Analysis of a prediction-based mobility adaptive tracking algorithm,” in Proc. Broadband Networks, 2nd International Conference on, IEEE, pp. 753-760, 2005.

LiminShen, Jianfeng Ma, Member, IEEE, Ximeng Liu, Member, IEEE, Fushan Wei and Meixia Miao, A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Network, 2017.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.