A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application

被引:3
作者
Eltayieb, Nabeil [1 ,3 ]
Elhabob, Rashad [1 ,3 ]
Liao, Yongjian [1 ]
Li, Fagen [2 ]
Zhou, Shijie [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[3] Karary Univ, Coll Comp Sci & Informat Technol, Khartoum 12304, Sudan
基金
中国国家自然科学基金;
关键词
Internet of Things (IoT); Cryptographic Reverse Firewalls; Heterogeneous systems; Confidentiality; Authentication;
D O I
10.1016/j.jisa.2024.103763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Snowden leaks exposed the truth that skilled attackers can access users' devices and steal their private information. Although public key encryption is widely used and theoretically secure, it has hidden vulnerabilities when implemented in practice. This is especially problematic when employing communication channels among heterogeneous protocols within the Internet of Things (IoT), it becomes apparent that these channels lack adequate protection to address the diverse nature of IoT systems. This work proposes a novel Heterogeneous Online/Offline Signcryption with Cryptographic Reverse Firewalls (HOOS-CRF). The scheme enables a secure communication channel between the sender in an Identity -based cryptosystem (IBC) and the receiver in the Public Key Infrastructure (PKI) cryptosystem with CRF deployed. To reduce computational costs, we split the signcryption algorithm into two stages: online and offline. Most resource -intensive operations are performed during the offline stage, which operates without any knowledge of the message being processed. The HOOS-CRF scheme provides confidentiality, authentication, and defense against insider security attacks. Meanwhile, we prove the security of the HOOS-CRF using the random oracle model and demonstrate its high efficiency and practicality through experiments. Lastly, the scheme's relevance to IoT-driven healthcare applications is demonstrated.
引用
收藏
页数:11
相关论文
共 35 条
[1]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]  
[Anonymous], 2014, Vulnerability Summary for CVE-2014-4423
[3]  
Ball J, 2013, Know Your Neighb
[4]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[5]   Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks [J].
Bellare, Mihir ;
Jaeger, Joseph ;
Kane, Daniel .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1431-1440
[6]  
Checkoway S, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P319
[7]   Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices [J].
Chen, Jiasheng ;
Wang, Liangliang ;
Wen, Mi ;
Zhang, Kai ;
Chen, Kefei .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8967-8979
[8]  
Chen K., 2017, No place to hide: Edward snowden, the NSA, and the US surveillance state
[9]   Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Susilo, Willy ;
Guo, Fuchun ;
Zhang, Mingwu .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :844-876
[10]   A heterogeneous online/offline signcryption scheme for Internet of Vehicles [J].
Chen, Zhiwei ;
Jin, Chunhua ;
Chen, Guanhua ;
Jin, Ying ;
Zong, Hui .
VEHICULAR COMMUNICATIONS, 2023, 43