Abstract
Conventional methods used in batch signature verification do not distinguish between static node signature verification and mobile node signature verification. Static nodes rarely face energy expenditure problem, but energy conservation is given a critical importance in mobile nodes. In this paper, we propose a new scheme for energy conservation at mobile receiver. Mobile receiver requests sender to modify the batch size based on the available energy at the receiver; when energy at the mobile receiver has reached particular threshold1, then sender is informed to reduce the batch size to half of the original batch size, which decreases the energy utilized by the mobile receiver for batch signature verification. When the energy at the mobile receiver has reached threshold2, then sender is informed to stop batch transmission till further request from mobile receiver for batch transmission of new batch size; this reduces packet loss which occurs when batches do not reach mobile receiver.
Similar content being viewed by others
Change history
28 September 2023
A Correction to this paper has been published: https://doi.org/10.1007/s42979-023-02168-3
References
Deering SE. Multicast routing in internetworks and extended LANs. In: Proceedings of the ACM SIGCOMM symposium on communications architectures and protocols; 1988. p. 55–64.
Ballardie T, Crowcroft J. Multicast-specific security threats and counter-measures. In: Proceedings second ANN network and distributed system security symposium (NDSS’95); 1995. p. 2–16.
Judge P, Ammar M. Security issues and solutions in multicast content distribution: a survey. IEEE Netw Mag. 2003;17(1):30–6.
Challal Y, Bettahar H, Bouabdallah A. A taxonomy of multicast data origin authentication: issues and solutions. IEEE Commun Surv Tutor. 2004;6(3):34–57.
Zhou Y, Zhu X, Fang Y. MABS: multicast authentication based on batch signature. IEEE Trans Mob Comput. 2010;9(7):982–93.
Lin Y, Shieh S, Lin W. Lightweight, pollution-attack resistant multicast authentication scheme. In: Proceedings ACM symposium information, computer, and communication security (ASIACCS’06); 2006.
Jeong J, Park Y, Cho Y. Efficient DoS resistant multicast authentication schemes. In: Proceedings Int’l conference computational science and its applications (ICCSA’05); 2005.
Even S, Goldreich O, Micali S. On-line/offline digital signatures. J Cryptol. 1996;9:35–67.
Rohatgi P. A compact and fast hybrid signature scheme for multicast packet. In: Sixth ACM conference on computer and communication security (CCS’99); 1999.
Wong CK, Lam SS. Digital signatures for flows and multicasts. In: Proceedings sixth Int’l conference network protocols (ICNP’98); 1998. p. 198–209.
Wong CK, Lam SS. Digital signatures for flows and multicasts. IEEE/ACM Trans Netw. 1999;7(4):502.
Gennaro R, Rohatgi P. How to sign digital streams. Inf Comput. 2001;165(1):100–16.
Gennaro R, Rohatgi P. How to sign digital streams. In: Proceedings 17th ANN cryptology conference advances in cryptology (CRYPTO’97); 1997.
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6.
Harn L. Batch verifying multiple RSA digital signatures. IEEE Electron Lett. 1998;34(12):1219–20.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Advances in Computational Intelligence, Paradigms and Applications” guest edited by Young Lee and S. Meenakshi Sundaram.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jagadeesha, R., Thippeswamy, K. Energy-Efficient Mobile Node in Multicast Batch Verification. SN COMPUT. SCI. 1, 110 (2020). https://doi.org/10.1007/s42979-020-0111-z
Published:
DOI: https://doi.org/10.1007/s42979-020-0111-z