CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (original) (raw)
Related papers
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things
In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability; non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user’s public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes.
IEEE Access
The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough comprehension of the whole spectrum of securing interconnected industries, from the edge to the cloud. Several signcryption schemes based on either identity-based or certificateless configurations are available in the literature to address the IIoT's security concerns. Due to the identity-based/certificateless nature of the available signcryption schemes, however, issues such as key escrow and partial private key distribution occur. To address these difficulties, we propose a Certificate-Based Signcryption (CBS) solution for IIoT in this article. Hyperelliptic Curve Cryptosystem (HECC), a lightweight version of Elliptic Curve Cryptosystem (ECC), was employed to construct the proposed scheme, which offers security and cost-efficiency. The HECC utilizes 80-bit keys with fewer parameters than the ECC and Bilinear Pairing (BP). The comparison of performance in terms of computation and communication costs reveals that the proposed scheme provides robust security with minimal communication and communication costs. Moreover, we used Automated Validation of Internet Security Protocols and Applications (AVISPA) to assess the security toughness, and the results show that the proposed scheme is secure. INDEX TERMS Certificate-based signcryption, industrial internet of things, wireless communication, HECC, AVISPA.
Journal of Sensor and Actuator Networks
As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distributes itself in a manner that is both more extensive and flexible. Combining wireless communication with the Internet of Things (IoT) can be used in several applications, including smart cities, smart traffic, smart farming, smart drones, etc. However, when exchanging data, wireless communication networks use an open network, allowing unauthorized users to engage in communication that is seriously destructive. Therefore, authentication through a digital signature will be the best solution to tackle such problems. Several digital signatures are contributing to the authentication process in a wireless communication network; however, they are s...
Certificateless Elliptic Curve Aggregate Signcryption Scheme
IEEE Systems Journal
Driven by new situation of "Internet +," Internet has achieved the integrated development with all walks of life. Among them, the fifth generation is a key technology to promote the deep integration of Internet-of-Things equipment, cloud computing, blockchain and other trades. Hence, it is necessary for IoTs to consider the cost and efficiency of authentication and confidentiality of the communication. For effectively solving the above problems, we devise certificateless elliptic curve aggregate signcryption (CL-ECASC) scheme for IoTs that can improve the authentication efficiency, realize data confidentiality, and avoid the problems of complex certificate management and key escrow. Under the hardness of discrete logarithm and computational DiffieHellman problems on elliptic curve, CL-ECASC is proved to has the IND-CCA2 security (indistinguishability under the adaptive chosen-ciphertext attacks) and UF-CMA security (existentially unforgeable under the adaptive chosen-message attacks). CL-ECASC has relatively faster computation efficiency and lower communication cost, and so it is suitable for secure transmission of the information in the previously mentioned environments.
Cost-Effective Proxy Signcryption Scheme for Internet of Things
Mobile Information Systems
The Internet of things (IoT) has emerged into a revolutionary technology that enables a wide range of features and applications given the proliferation of sensors and actuators embedded in everyday objects, as well as the ubiquitous availability of high-speed Internet. When nearly everything is connected to the Internet, security and privacy concerns will become more significant. Furthermore, owing to the resource-constrained nature of IoT devices, they are unable to perform standard cryptographic computations. As a result, there is a critical need for efficient and secure lightweight cryptographic scheme that can meet the demands of resource-constrained IoT devices. In this study, we propose a lightweight proxy in which a person/party can delegate its signing authority to a proxy agent. Existing proxy signcryption security approaches are computationally costly and rely on RSA, bilinear pairing, and elliptic curves cryptography (ECC). The hyperelliptic curve cryptosystem (HECC), on ...
A Signcryption Scheme from Certificateless to Identity-based Environment for WSNs into IoT
2015
Wireless sensor network (WNS) is now an inevitable component of the internet of things (IoT), this integration creates new security challenges that exist between the sensor nodes and the internet host, thus, issue regarding setting up a non-compromised channel between these two ends. In this scheme we required that the sender of the message belongs to the internet host where huge computation can be done without incurring any delays or computational problem while the receiver belongs to the sensor node. The scheme is shown to be suitable and secure using random oracle of bilinear Diffie-Hellman assumption hence providing strong security for wireless sensors into internet of things.
HOOSC: heterogeneous online/offline signcryption for the Internet of Things
Wireless Networks, 2017
In order to improve the accessibility of the services provided by a sensor network, wireless sensor networks (WSNs) is integrated to Internet of Things (IoTs). In this case, the security is one of the issues be considered when integrating wireless sensor network to IoTs. In this paper, a heterogeneous secure scheme is proposed to build a secure channel between WSNs and Internet server in the IoTs. To achieve better security with minimum cost in WSNs, certificateless and online/offline technique are used. In addition, to increase the scalability at the Internet server side, public key infrastructure is used. As compared with four existing heterogeneous schemes, the proposed scheme has less energy consumption and computational cost. In addition, two application scenarios that illustrate how the proposed scheme can be applied in the IoTs have been given. Keywords Internet of Things (IoTs) Á Certificateless cryptosystem (CLCS) Á Public key infrastructure cryptosystem (PKICS) Á Wireless sensor networks (WSNs) Á Signcryption Á Security Wireless Netw
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-today life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows–Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
EDAS: Efficient Data Aggregation Scheme for Internet of Things
Journal of Applied Security Research, 2018
The pervasiveness of the Internet has attracted a new paradigm of technology known as Internet-of-Things (IoT). The numerous devices connected to IoT generate huge amount of data which must be protected and efficiently verified by the data center. To achieve big data authentication in IoT, several certificateless aggregate signature schemes have been proposed. However, their design is based on bilinear pairing operation, which is known to be mathematically complex. In this work, we propose a secure and efficient data aggregation scheme for IoT known as Efficient Data Aggregation Scheme (EDAS) without using complex mathematical operation. The performance analysis shows that EDAS is computationally more efficient than related schemes.
Mathematical Problems in Engineering, 2014
Certificateless cryptography aims at combining the advantages of public key cryptography and identity based cryptography to avoid the certificate management and the key escrow problem. In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem and factoring the large number as in an RSA protocol. Moreover, since our scheme requires only one pairing operation in decryption, it is significantly more efficient than other related schemes. In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes.