Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices (original) (raw)

Efficient Digital Signature Scheme for Industrial Internet of Things

With rapid advancement in wireless technology and pervasive digital technology have provided in increasing popularity and interest of Internet Industrial of Things (IoT) methodology, ubiquitously giving convenience and intelligence to our daily activities. In IoT based system scenario, smart components are associated everywhere as universal things linked in a pervasive model. Ensuring privacy for intersection amongst smart objects is significantly more important, in this paper, we propose a novel signature scheme which is utilized for carrying communication amongst devices in IIoT environment. Moreover we revealed different scheme that are vulnerable. The significance of the proposed scheme over other existing scheme are analyzed in terms of the summary which is illustrated using performance and security comparison.

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

Journal of Sensor and Actuator Networks

As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distributes itself in a manner that is both more extensive and flexible. Combining wireless communication with the Internet of Things (IoT) can be used in several applications, including smart cities, smart traffic, smart farming, smart drones, etc. However, when exchanging data, wireless communication networks use an open network, allowing unauthorized users to engage in communication that is seriously destructive. Therefore, authentication through a digital signature will be the best solution to tackle such problems. Several digital signatures are contributing to the authentication process in a wireless communication network; however, they are s...

Lightweight Identity Based Signature for Mobile Object Authentication in the Internet of Things

2018

Trusted communication is crucial for data sharing and resource access in the context of the Internet of Things (IoT). This paper presents a lightweight hierarchical authentication protocol, using identity based signature, to serve IoT mobile objects. The proposed protocol has three entities; Private Key Generator (PKG), sub_PKG, and mobile objects. A comparison with other related protocols according to the key generation method, key distribution method, and the security attack model is presented. BAN logic is used for formal verification of the proposed protocol. Moreover, the performance is evaluated based on a quantitative measure of performance metrics such as number of scalar multiplication and modular inverse operations. The evaluation shows that the proposed protocol has a lower total computation cost since it does not use expensive hash to point, modular inverse, and bilinear pairing operations. This makes it more efficient and suitable in supporting IoT constrained mobile ob...

Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things

Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.

An Elliptic Curve On-line \ Off-line Digital Signature Scheme for Internet of Things

2016

The communication model of Internet of Things (IOT) includes networks infrastructure (e.g. ultra-wideband networks, 3G and 4G networks). It also includes the adoption of IPv6 in order to provide a unique IP address to any entity involved in the network. It also comprises technologies that allow the location and identification of physical objects (e.g. RFID). There are also some other technologies that influence on the successful development of IoT applications. These technologies are computer vision, biometric systems, robotics, and others. In this paper, an elliptic curve on-line/off-line threshold digital signature scheme for Internet of Things is presented. In the proposed scheme, there are two phases for computing the digital signature of a message: off-line phase and on-line phase. The majority of the digital signature computation is performed offline which saves power and time. We also prove that our proposed schemes have achieved the desired security requirements. Extensive s...

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-today life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows–Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Informatica

To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sign-then-encrypt procedure must be performed only by the same entity. However, the entities, such as wireless sensors and smart cards, are resource-constrained and become time consuming in executing the two-layer sign-then-encrypt procedure. Nowadays, the usage of mobile cloud computing is gaining expanding interest which provides scalable and virtualized services over the Internet or wireless networks while users with resource-constrained devices can enjoy the advantages of mobile cloud computing environments. Hence, we aim to reduce the computational cost for resource-constrained devices by employing a third party. In this article, we present the first separable ID-based signcryption (SIBSC) scheme in which the signing and encrypting layers are performed by the device and a third party, respectively. Under the computation Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions, we demonstrate that the proposed SIBSC scheme offers the provable security of authentication and confidentiality while retaining communication performance.

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

IEEE Access

The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources with these huge connections. Therefore, in this paper we present a signcryption framework to address the above problems. The solution highlights the use of aggregate signcryption and certificaless approach based on bilinear pairings. The use of signcryption with aggregation and certificateless authentication reduces the time consumption, overhead and complexity. The solution is also able to solve the key staling problems. Experimental results and comparative analysis based on key parameters, memory utilization and bandwidth utilization have been measured. It confirms that the presented work is efficient for IoT infrastructure.

A signature-based data security and authentication framework for internet of things applications

International Journal of Electrical and Computer Engineering (IJECE), 2022

Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.

A Secure and Efficient Signature Scheme for IoT in Healthcare

Computers, Materials & Continua

To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps in improving the treatment as well as getting faster medical assistance, tracking of routine activities and health focus of elderly people on frequent basis. However, the data transmission from IoT devices to the cloud faces many security challenges and is vulnerable to different security and privacy threats during the transmission path. The purpose of this research is to design a Certificateless Secured Signature Scheme that will provide a magnificent amount of security during the transmission of data. Certificateless signature, that removes the intricate certificate management and key escrow problem, is one of the practical methods to provide data integrity and identity authentication for the IoT. Experimental result shows that the proposed scheme performs better than the existing certificateless signature schemes in terms of computational cost, encryption and decryption time. This scheme is the best combination of high security and cost efficiency and is further suitable for the resource constrained IoT environment.