Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.11.2459

Digital Signature Model of Sensor Network Using Hash Chain  

Kim, Young-Soo (충북대학교 컴퓨터공학과)
Cho, Seon-Goo (나사렛대학교 호텔관광경영학과)
Abstract
In sensor network there are no nodes or servers that are exclusively responsible for packet forwarding and routing. Instead, sensor nodes participating in network communications perform these activities. Thus, they are vulnerable to the alteration and forgery of message in the process of packet forwarding and routing. To solve this problem, a security to ensure authentication and integrity of routing and forwarding messages should be required. To do this, we propose the hash chain-based digital signature model where it takes less time to compute in generating and verifying the digital signature model, unlike he public key-based digital signature model, and verify if this model is proper by comparing computation times between tow models.
Keywords
Sensor Network; Hash Chain; Digital Signature;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Schneier, B., One-Way Hash Function, Dr. Dobb's Journal,pp. 148-151 September, 1991
2 Rivest, R., A. Shamir, and L. Adleman, "A method for obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21, pp. 120-126, 1978   DOI   ScienceOn
3 Hu, F., et al., "Secure wireless sensor networks: problems and solutions," J. of SCI, to appear, 2004
4 Handy M. J., et aI., Low Energy Adaptive "Clustering Hierarchy with Detenninistic Cluster-Head Selection," IEEE, 2002
5 Wang X. and H. Yu, "How to Break MD5 and Other Hash Functions, Advances in Cryptology-Eurocrypt," '2005, LNCS 3494, Springer-Verlag, pp. 19-35,2005
6 Bechler M., et al., "A Cluster-Based security architecture for ad hoc networks, II in: Proceedings of IEEE Conference on Computer Communications Hong Kong, March 2004
7 Perrig A., et aI., "Security in wireless sensor networks," Commun. OF ACM, 47(5), pp. 53-57, June 2004   DOI   ScienceOn
8 Jamil Ibriq and Imad Mahgoub "Cluster-Based Routing in Wireless Sensor Networks: Issues and Challenges," SPECTS 2004
9 Karlof C. and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countenneasures," Ad Hoc Networks, vol, 1, issues 2-3(Special Issue on Sensor Network Applications and Protocols), Elsevier, pp. 293-315, Sep.2003   DOI   ScienceOn
10 Krzysztof Piotrowski et aI., "How public key cryptography influences wireless sensor node lifetime," Proceedings of the fourth ACM workshop on Security of ad-hoc and sensor networks, Alexandria, Virginia, USA, 2006
11 Gaubatz, G., et al., "Public key cryptography in sensor networks-revisited," 1st European Workshop on Security in Ad-Hoc and Sensor Networs, 2004