Signcryption-based security framework for low computing power devices

被引:0
作者
Singh A.K. [1 ]
Patro B.D.K. [2 ]
机构
[1] Department of Computer Science and Engineering, Dr. A.P.J. Abdul Kalam Technical University, Lucknow, U.P
[2] Department of Computer Science and Engineering, Rajkiya Engineering College, Kannauj, U.P
关键词
Low computing power devices; RFID; Security; Signcryption; Smart card; WSN;
D O I
10.2174/2213275912666190617161732
中图分类号
学科分类号
摘要
Background: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern. Proposed Work: In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confi-dentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, de-synchronization attack, impersonation attack, key-compromise attack, location tracking attack, de-nial of service attack, and man-in-the-middle attack. Results: Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes. Conclusion: The proposed protocol presented in this paper can be used as a building block in de-signing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards. © 2020 Bentham Science Publishers.
引用
收藏
页码:845 / 857
页数:12
相关论文
共 27 条
  • [1] Singh A.K., Patro B.D.K., Security of low computing power devices: A survey of requirements, challenges & possible solu-tions, Cybern. Inf. Technol, 19, 1, pp. 133-164, (2019)
  • [2] Mukhopadhyay S.C., Internet of Things: Challenges and Op-portunities, 9, pp. 1-17, (2014)
  • [3] Lopez J., Roman R., Alcaraz C., Analysis of security threats, requirements, technologies and standards in wireless sensor net-works, Foundations of Security Analysis and Design V, 5705, pp. 289-338, (2009)
  • [4] Knospe H., Pohl H., RFID Security, Inf. Secur. Tech. Rep, 9, 4, pp. 39-50, (2004)
  • [5] Markantonakis K., Mayes K., Tunstall M., Sauveron D., Piper F., Smart card security, Studies in Computational Intelli-gence, 57, pp. 201-234, (2007)
  • [6] Liao Y.P., Hsiao C.M., A secure ECC-based RFID authentication scheme using hybrid protocols, Advances in Intelligent Systems and Applications, Smart Innovation, Systems and Technolo-gies, 21, pp. 1-13, (2013)
  • [7] Zhao Z., A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, J. Med. Syst, 38, 5, (2014)
  • [8] Alamr A.A., Kausar F., Kim J.S., Secure mutual authentication protocol for RFID based on elliptic curve cryptography, Proc. of International Conference on Platform Technology and Service (PlatCon), pp. 1-7, (2016)
  • [9] Jin C., Xu C., Zhang X., Li F., A Secure ECC-based RFID mutual authentication protocol to enhance patient medication safe-ty, J. Med. Syst, 40, 1, (2016)
  • [10] Zheng L., Xue Y., Zhang L., Zhang R., Mutual authentication protocol for RFID based on ECC, Proc. of IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 320-323, (2017)