4.7 Article

Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 15, Issue 4, Pages 2202-2212

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2020.3039976

Keywords

Network coding; Pollution; Throughput; Internet of Things; Encoding; Wireless sensor networks; Medical services; IoT; wireless sensor networks; network coding; pollution attacks; identity-based linearly homomorphic signature

Funding

  1. National Natural Science Foundation of China [61672289, 61802195]
  2. Natural Science Foundation of Jiangsu Province [BK20190696]

Ask authors/readers for more resources

This article proposes an efficient identity-based linearly homomorphic network coding signature scheme for wireless sensor networks to ensure data integrity and authenticity. The scheme has high computational efficiency and is resistant to various attacks.
With the appearance and flourishing development of the Internet of Things (IoT), wireless sensor networks technology has been attracting increasing attention. Network coding is an indispensable technology in the wireless sensor networks, which can improve network transmission throughput. However, pollution attacks is a serious security problem that must be faced in the process of data coding. Although the homomorphic network coding signature schemes can solve this troublesome, the high signature generation and verification cost of these schemes will reduce the transmission efficiency. In this article, we propose an efficient identity-based linearly homomorphic network coding signature scheme for wireless sensor networks to guarantee data integrity and authenticity. In our scheme, the computation cost of signature generation and verification are both independent of the size of the data packet. The scheme is proved secure against existential forgery under adaptive chosen identity and adaptive chosen subspace attacks in random oracle model. Using Java pairing-based Cryptography Library (JPBC), the simulation results illustrate that our scheme is more efficient in practical application.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available