Loading…

Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi

Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If...

Full description

Saved in:
Bibliographic Details
Main Authors: Kojima, Hideharu, Yanai, Naoto
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 236
container_issue
container_start_page 230
container_title
container_volume
creator Kojima, Hideharu
Yanai, Naoto
description Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.
doi_str_mv 10.1109/CANDAR.2017.68
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8345436</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8345436</ieee_id><sourcerecordid>8345436</sourcerecordid><originalsourceid>FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3</originalsourceid><addsrcrecordid>eNotjMtKw0AUQEdBsNZu3biZH0i988g8liGtWixaEl2XSXLTjuRRJqnQvzegqwOHwyHkgcGSMbBPafK-SrIlB6aXylyROxYLozgYza7JjAttI2asuiWLYfgGAMFBghIz8rbDUPehdV2JdP3jmrMbfd_RydHxiDT3h86N54A0aQ598OOxpX1NN_kqz-jUZW44FRjChe78PbmpXTPg4p9z8vW8_kxfo-3HyyZNtpHnko0RlnGFYLUWrnIltwVWseU2Bi4QCiMUd4ZVrGDa4UQL0oA1WMdMo3SyFnPy-Pf1iLg_Bd-6cNkbIWMplPgFudVMQA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><source>IEEE Xplore All Conference Series</source><creator>Kojima, Hideharu ; Yanai, Naoto</creator><creatorcontrib>Kojima, Hideharu ; Yanai, Naoto</creatorcontrib><description>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</description><identifier>EISSN: 2379-1896</identifier><identifier>EISBN: 1538620871</identifier><identifier>EISBN: 9781538620878</identifier><identifier>DOI: 10.1109/CANDAR.2017.68</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aggregates ; Digital signatures ; identity-based sequential aggregate signatures ; ISDSR ; Performance evaluation ; Public key ; Routing protocols ; secure routing protocols ; Sensors ; Wireless sensor networks</subject><ispartof>2017 Fifth International Symposium on Computing and Networking (CANDAR), , p.230-236</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8345436$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8345436$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><title>2017 Fifth International Symposium on Computing and Networking (CANDAR)</title><addtitle>CANDAR</addtitle><description>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</description><subject>Aggregates</subject><subject>Digital signatures</subject><subject>identity-based sequential aggregate signatures</subject><subject>ISDSR</subject><subject>Performance evaluation</subject><subject>Public key</subject><subject>Routing protocols</subject><subject>secure routing protocols</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>2379-1896</issn><isbn>1538620871</isbn><isbn>9781538620878</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjMtKw0AUQEdBsNZu3biZH0i988g8liGtWixaEl2XSXLTjuRRJqnQvzegqwOHwyHkgcGSMbBPafK-SrIlB6aXylyROxYLozgYza7JjAttI2asuiWLYfgGAMFBghIz8rbDUPehdV2JdP3jmrMbfd_RydHxiDT3h86N54A0aQ598OOxpX1NN_kqz-jUZW44FRjChe78PbmpXTPg4p9z8vW8_kxfo-3HyyZNtpHnko0RlnGFYLUWrnIltwVWseU2Bi4QCiMUd4ZVrGDa4UQL0oA1WMdMo3SyFnPy-Pf1iLg_Bd-6cNkbIWMplPgFudVMQA</recordid><creator>Kojima, Hideharu</creator><creator>Yanai, Naoto</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><title>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</title><author>Kojima, Hideharu ; Yanai, Naoto</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><topic>Aggregates</topic><topic>Digital signatures</topic><topic>identity-based sequential aggregate signatures</topic><topic>ISDSR</topic><topic>Performance evaluation</topic><topic>Public key</topic><topic>Routing protocols</topic><topic>secure routing protocols</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kojima, Hideharu</au><au>Yanai, Naoto</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi</atitle><btitle>2017 Fifth International Symposium on Computing and Networking (CANDAR)</btitle><stitle>CANDAR</stitle><spage>230</spage><epage>236</epage><pages>230-236</pages><eissn>2379-1896</eissn><eisbn>1538620871</eisbn><eisbn>9781538620878</eisbn><coden>IEEPAD</coden><abstract>Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.</abstract><pub>IEEE</pub><doi>10.1109/CANDAR.2017.68</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2379-1896
ispartof 2017 Fifth International Symposium on Computing and Networking (CANDAR), , p.230-236
issn 2379-1896
language eng
recordid cdi_ieee_primary_8345436
source IEEE Xplore All Conference Series
subjects Aggregates
Digital signatures
identity-based sequential aggregate signatures
ISDSR
Performance evaluation
Public key
Routing protocols
secure routing protocols
Sensors
Wireless sensor networks
title Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T03%3A43%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Performance%20Evaluation%20for%20the%20Signature%20Algorithm%20of%20ISDSR%20on%20Raspberry%20Pi&rft.btitle=2017%20Fifth%20International%20Symposium%20on%20Computing%20and%20Networking%20(CANDAR)&rft.au=Kojima,%20Hideharu&rft.spage=230&rft.epage=236&rft.pages=230-236&rft.eissn=2379-1896&rft.coden=IEEPAD&rft_id=info:doi/10.1109/CANDAR.2017.68&rft.eisbn=1538620871&rft.eisbn_list=9781538620878&rft_dat=%3Cieee_CHZPO%3E8345436%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i241t-ec5de09773adac29bed59295023e0b8362a81d1b17ae1d19048098ef517e4a4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8345436&rfr_iscdi=true