A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks
Sajid Ullah, Syed; Hussain, Saddam; Uddin, Mueen; Alroobaea, Roobaea; Iqbal, Jawaid; Baqasah, Abdullah M.; Abdelhaq, Maha; Alsaqour, Raed
Peer reviewed, Journal article
Published version
Permanent lenke
https://hdl.handle.net/11250/3033425Utgivelsesdato
2022Metadata
Vis full innførselSamlinger
Originalversjon
Sajid Ullah, S., Hussain, S., Uddin, M., Alroobaea, R., Iqbal, J., Baqasah, A. M., Abdelhaq, M. & Alsaqour, R. (2022). A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks. Sensors, 22(14), 1-22. https://doi.org/10.3390/s22145150Sammendrag
Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very sensitive and unique, the authentication of users is very important to access the data and information. UWSNs have unique communication and computation needs that are not met by the existing digital signature techniques. As a result, a lightweight signature scheme is required to meet the communication and computa‑ tion requirements. In this research, we present a Certificateless Online/Offline Signature (COOS) mechanism for UWSNs. The proposed scheme is based on the concept of a hyperelliptic curves cryptosystem, which offers the same degree of security as RSA, bilinear pairing, and elliptic curve cryptosystems (ECC) but with a smaller key size. In addition, the proposed scheme was proven secure in the random oracle model under the hyperelliptic curve discrete logarithm problem. A se‑ curity analysis was also carried out, as well as comparisons with appropriate current online/offline signature schemes. The comparison demonstrated that the proposed scheme is superior to the exist‑ ing schemes in terms of both security and efficiency. Additionally, we also employed the fuzzy‑based Evaluation‑based Distance from Average Solutions (EDAS) technique to demonstrate the effective‑ ness of the proposed scheme.