Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices

被引:46
|
作者
Karati, Arijit [1 ]
Fan, Chun-I [1 ,2 ]
Hsu, Ruei-Hau [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[2] Telecom Technol Ctr, Kaohsiung 82151, Taiwan
关键词
Certificateless cryptography; Internet of Things (IoT) security; pairing-based cryptography; signcryption; CERTIFICATELESS SIGNCRYPTION; PAIRING-FREE; SCHEME; CRYPTANALYSIS;
D O I
10.1109/JIOT.2019.2939204
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is revolutionizing our modern lives by introducing active connection between smart devices. However, IoT devices are repeatedly exhibiting many security flaws, which will inevitably lead to eavesdropping and impersonation attacks. Thus, providing a proper security in IoT becomes a prime focus for the researchers. In cryptography, certificateless signcryption (CLSC) is one of the recent public key techniques for the security requirements of the authenticity and confidentiality of any message between the parties. In this article, a new generalized CLSC (gCLSC) is introduced to provide the functions of digital signature and encryption to fulfill the authenticity and confidentiality for the resource-constrained IoT devices. Besides, the gCLSC supports the property of public verifiability and security of an ideal signcryption under the strong Diffie-Hellman and bilinear Diffie-Hellman inversion problems without random oracle model. Performance assessment of the gCLSC gives satisfactory results after comparing with other competitive CLSC schemes in terms of its functionality. Therefore, the gCLSC can be adopted in the IoT networks where authenticity, confidentiality, and lightweight are the essential factors.
引用
收藏
页码:10431 / 10440
页数:10
相关论文
共 38 条
  • [1] Comments on "Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices"
    Zhang, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4666 - 4670
  • [2] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [3] Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (01) : 411 - 420
  • [4] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)
  • [5] A lightweight secure data transmission protocol for resource constrained devices
    Yu, Qian
    Zhang, Chang N.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 362 - 370
  • [6] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [7] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT
    Noguchi, Taku
    Nakagawa, Masato
    Yoshida, Masami
    Ramonet, Alberto Gallegos
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
  • [8] Secure and Low-Power Authentication for Resource-Constrained Devices
    Sethi, Mohit
    Kortoci, Pranvera
    Di Francesco, Mario
    Aura, Tuomas
    PROCEEDINGS 2015 5TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT), 2015, : 30 - 36
  • [9] A lightweight secure cyber foraging infrastructure for resource-constrained devices
    Goyal, S
    Carter, J
    SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195
  • [10] An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
    Rana, Sohel
    Hossain, Saddam
    Shoun, Hasan Imam
    Abul Kashem, Mohammod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 267 - 275