咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secure Data Delivery With Iden... 收藏

Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT

作     者:Li, Yumei Zhang, Futai Liu, Xin 

作者机构:Nanjing Normal Univ Sch Math Sci Nanjing 210023 Jiangsu Peoples R China Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Fujian Peoples R China Nanjing Normal Univ Sch Comp Sci & Technol Nanjing 210023 Jiangsu Peoples R China 

出 版 物:《IEEE TRANSACTIONS ON SERVICES COMPUTING》 (IEEE Trans. Serv. Comput.)

年 卷 期:2022年第15卷第4期

页      面:2202-2212页

核心收录:

学科分类:0808[工学-电气工程] 08[工学] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Natural Science Foundation of China [61672289, 61802195] Natural Science Foundation of Jiangsu Province [BK20190696] 

主  题:Network coding Pollution Throughput Internet of Things Encoding Wireless sensor networks Medical services IoT wireless sensor networks network coding pollution attacks identity-based linearly homomorphic signature 

摘      要:With the appearance and flourishing development of the Internet of Things (IoT), wireless sensor networks technology has been attracting increasing attention. Network coding is an indispensable technology in the wireless sensor networks, which can improve network transmission throughput. However, pollution attacks is a serious security problem that must be faced in the process of data coding. Although the homomorphic network coding signature schemes can solve this troublesome, the high signature generation and verification cost of these schemes will reduce the transmission efficiency. In this article, we propose an efficient identity-based linearly homomorphic network coding signature scheme for wireless sensor networks to guarantee data integrity and authenticity. In our scheme, the computation cost of signature generation and verification are both independent of the size of the data packet. The scheme is proved secure against existential forgery under adaptive chosen identity and adaptive chosen subspace attacks in random oracle model. Using Java pairing-based Cryptography Library (JPBC), the simulation results illustrate that our scheme is more efficient in practical application.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分