• DocumentCode
    2293589
  • Title

    A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks

  • Author

    Zhang, Yang

  • Author_Institution
    State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
  • fYear
    2009
  • fDate
    19-21 Oct. 2009
  • Firstpage
    208
  • Lastpage
    215
  • Abstract
    Nodes in ad hoc networks often self-organize into clusters in which a node need anonymously prove the membership in some scenarios. For a self-organized cluster, any node should have the capacity to act as the cluster manger and use varying pseudonyms to keep privacy while the procedure of reissuing key is not desirable. Dynamic group signature schemes provide a probable solution, but are inappropriate because no incorruptible online TA (trusted authority) exists to run a group-key generation algorithm in the corruptible clusters of an ad hoc network, the opening capability are not absolutely necessary for a temporary cluster, and how to generate pseudonyms are not specified. To resolve the above problem, this paper proposes a pseudonym-based signature scheme where pseudonyms can be self-generated and messages can be bound to the self-generated pseudonyms. After the TA offline issues keys to all nodes, cluster managers can be dynamically elected and compute the public cluster-keys, which allow a node to dynamically join or leave the cluster by updating its restriction pseudonym. Then, only cluster members can sign messages on behalf of the cluster. Because the pseudonyms are self-updated and not directly bound to certificates, the signature scheme based on them must satisfy some new requirements. Hence, we formalize a security model for pseudonym-based signature schemes. The security of our scheme is proved in the random oracle model.
  • Keywords
    ad hoc networks; cryptography; data privacy; digital signatures; telecommunication security; ad hoc network; dynamic cluster; dynamic group signature scheme; group-key generation algorithm; privacy; pseudonym-based signature scheme; random oracle model; trusted authority; Ad hoc networks; Clustering algorithms; Cryptographic protocols; Cryptography; Digital signatures; Laboratories; Privacy; Routing protocols; Telecommunication switching; Topology; Ad Hoc Network; Anonymity; Digital Signature Scheme; Pseudonym System;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network and System Security, 2009. NSS '09. Third International Conference on
  • Conference_Location
    Gold Coast, QLD
  • Print_ISBN
    978-1-4244-5087-9
  • Electronic_ISBN
    978-0-7695-3838-9
  • Type

    conf

  • DOI
    10.1109/NSS.2009.69
  • Filename
    5318894