Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices

被引:46
|
作者
Karati, Arijit [1 ]
Fan, Chun-I [1 ,2 ]
Hsu, Ruei-Hau [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[2] Telecom Technol Ctr, Kaohsiung 82151, Taiwan
关键词
Certificateless cryptography; Internet of Things (IoT) security; pairing-based cryptography; signcryption; CERTIFICATELESS SIGNCRYPTION; PAIRING-FREE; SCHEME; CRYPTANALYSIS;
D O I
10.1109/JIOT.2019.2939204
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is revolutionizing our modern lives by introducing active connection between smart devices. However, IoT devices are repeatedly exhibiting many security flaws, which will inevitably lead to eavesdropping and impersonation attacks. Thus, providing a proper security in IoT becomes a prime focus for the researchers. In cryptography, certificateless signcryption (CLSC) is one of the recent public key techniques for the security requirements of the authenticity and confidentiality of any message between the parties. In this article, a new generalized CLSC (gCLSC) is introduced to provide the functions of digital signature and encryption to fulfill the authenticity and confidentiality for the resource-constrained IoT devices. Besides, the gCLSC supports the property of public verifiability and security of an ideal signcryption under the strong Diffie-Hellman and bilinear Diffie-Hellman inversion problems without random oracle model. Performance assessment of the gCLSC gives satisfactory results after comparing with other competitive CLSC schemes in terms of its functionality. Therefore, the gCLSC can be adopted in the IoT networks where authenticity, confidentiality, and lightweight are the essential factors.
引用
收藏
页码:10431 / 10440
页数:10
相关论文
共 38 条
  • [31] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    Qinlong Huang
    Licheng Wang
    Yixian Yang
    World Wide Web, 2018, 21 : 151 - 167
  • [32] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    Huang, Qinlong
    Wang, Licheng
    Yang, Yixian
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 151 - 167
  • [33] Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations
    Gamiz, Idoia
    Regueiro, Cristina
    Lage, Oscar
    Jacob, Eduardo
    Astorga, Jasone
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [34] Reference architecture for secure cloud based remote automation Zero-knowledge initial enrolment of resource-constrained IoT with symbiotic security
    Bartsch, Witali
    Huebner, Michael
    ATP MAGAZINE, 2019, (09): : 72 - 81
  • [35] RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
    Srinath S.
    Nagaraja G.S.
    SN Computer Science, 5 (6)
  • [36] An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
    Pasupuleti, Syam Kumar
    Ramalingam, Subramanian
    Buyya, Rajkumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 12 - 22
  • [37] Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain
    Premkumar R.
    Sathya Priya S.
    Measurement: Sensors, 2022, 24
  • [38] Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices
    Goel, Lokesh
    Chawla, Hardik
    Dua, Mohit
    Dua, Shelza
    Dhingra, Deepti
    SMART SCIENCE, 2024, 12 (01) : 27 - 42