Loading…
Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 236 |
container_issue | |
container_start_page | 230 |
container_title | |
container_volume | |
creator | Kojima, Hideharu Yanai, Naoto |
description | Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes. |
doi_str_mv | 10.1109/CANDAR.2017.68 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8345436</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8345436</ieee_id><sourcerecordid>8345436</sourcerecordid><originalsourceid>FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3</originalsourceid><addsrcrecordid>eNotjMtKw0AUQEdBsNZu3biZH0i988g8liGtWixaEl2XSXLTjuRRJqnQvzegqwOHwyHkgcGSMbBPafK-SrIlB6aXylyROxYLozgYza7JjAttI2asuiWLYfgGAMFBghIz8rbDUPehdV2JdP3jmrMbfd_RydHxiDT3h86N54A0aQ598OOxpX1NN_kqz-jUZW44FRjChe78PbmpXTPg4p9z8vW8_kxfo-3HyyZNtpHnko0RlnGFYLUWrnIltwVWseU2Bi4QCiMUd4ZVrGDa4UQL0oA1WMdMo3SyFnPy-Pf1iLg_Bd-6cNkbIWMplPgFudVMQA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><source>IEEE Xplore All Conference Series</source><creator>Kojima, Hideharu ; Yanai, Naoto</creator><creatorcontrib>Kojima, Hideharu ; Yanai, Naoto</creatorcontrib><description>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</description><identifier>EISSN: 2379-1896</identifier><identifier>EISBN: 1538620871</identifier><identifier>EISBN: 9781538620878</identifier><identifier>DOI: 10.1109/CANDAR.2017.68</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aggregates ; Digital signatures ; identity-based sequential aggregate signatures ; ISDSR ; Performance evaluation ; Public key ; Routing protocols ; secure routing protocols ; Sensors ; Wireless sensor networks</subject><ispartof>2017 Fifth International Symposium on Computing and Networking (CANDAR), , p.230-236</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8345436$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8345436$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><title>2017 Fifth International Symposium on Computing and Networking (CANDAR)</title><addtitle>CANDAR</addtitle><description>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</description><subject>Aggregates</subject><subject>Digital signatures</subject><subject>identity-based sequential aggregate signatures</subject><subject>ISDSR</subject><subject>Performance evaluation</subject><subject>Public key</subject><subject>Routing protocols</subject><subject>secure routing protocols</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>2379-1896</issn><isbn>1538620871</isbn><isbn>9781538620878</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjMtKw0AUQEdBsNZu3biZH0i988g8liGtWixaEl2XSXLTjuRRJqnQvzegqwOHwyHkgcGSMbBPafK-SrIlB6aXylyROxYLozgYza7JjAttI2asuiWLYfgGAMFBghIz8rbDUPehdV2JdP3jmrMbfd_RydHxiDT3h86N54A0aQ598OOxpX1NN_kqz-jUZW44FRjChe78PbmpXTPg4p9z8vW8_kxfo-3HyyZNtpHnko0RlnGFYLUWrnIltwVWseU2Bi4QCiMUd4ZVrGDa4UQL0oA1WMdMo3SyFnPy-Pf1iLg_Bd-6cNkbIWMplPgFudVMQA</recordid><creator>Kojima, Hideharu</creator><creator>Yanai, Naoto</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><author>Kojima, Hideharu ; Yanai, Naoto</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><topic>Aggregates</topic><topic>Digital signatures</topic><topic>identity-based sequential aggregate signatures</topic><topic>ISDSR</topic><topic>Performance evaluation</topic><topic>Public key</topic><topic>Routing protocols</topic><topic>secure routing protocols</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kojima, Hideharu</au><au>Yanai, Naoto</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</atitle><btitle>2017 Fifth International Symposium on Computing and Networking (CANDAR)</btitle><stitle>CANDAR</stitle><spage>230</spage><epage>236</epage><pages>230-236</pages><eissn>2379-1896</eissn><eisbn>1538620871</eisbn><eisbn>9781538620878</eisbn><coden>IEEPAD</coden><abstract>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</abstract><pub>IEEE</pub><doi>10.1109/CANDAR.2017.68</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2379-1896 |
ispartof | 2017 Fifth International Symposium on Computing and Networking (CANDAR), , p.230-236 |
issn | 2379-1896 |
language | eng |
recordid | cdi_ieee_primary_8345436 |
source | IEEE Xplore All Conference Series |
subjects | Aggregates Digital signatures identity-based sequential aggregate signatures ISDSR Performance evaluation Public key Routing protocols secure routing protocols Sensors Wireless sensor networks |
title | Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T03%3A43%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Performance%20Evaluation%20for%20the%20Signature%20Algorithm%20of%20ISDSR%20on%20Raspberry%20Pi&rft.btitle=2017%20Fifth%20International%20Symposium%20on%20Computing%20and%20Networking%20(CANDAR)&rft.au=Kojima,%20Hideharu&rft.spage=230&rft.epage=236&rft.pages=230-236&rft.eissn=2379-1896&rft.coden=IEEPAD&rft_id=info:doi/10.1109/CANDAR.2017.68&rft.eisbn=1538620871&rft.eisbn_list=9781538620878&rft_dat=%3Cieee_CHZPO%3E8345436%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8345436&rfr_iscdi=true |