A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment

被引:3
作者
Patil, Rachana Y. [1 ]
Patil, Yogesh H. [2 ]
机构
[1] Pimpri Chinchwad Coll Engn, Pune, Maharashtra, India
[2] VBK Infra & Engn Projects, IME Div, Pune 11014, Maharashtra, India
关键词
internet of things; IoT; elliptic curve cryptography; ECC; signcryption; fog computing; proxy signature; INTERNET; CLOUD; ENCRYPTION; SYSTEMS; THINGS;
D O I
10.1504/IJCSE.2023.129743
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Rapid technical advancements have transformed the industrial segment. The internet limits the meaning of industrial IoT (IIoT) to the production Industry, which is Industry 4.0. IIoT includes sensors, positioners, and actuators. As a result, various forms of data is produced. Due to delays and safety issues, most industrial processes must be completed locally before data sent to cloud. Fog computing's localised data processing makes it a suitable mediator. Industrial data is regularly shared among different applications for analysis, decision-making, and research. Here, we proposed an ECC-based proxy signcryption for IIoT (ECC-PSC-IIoT) in a fog computing environment. The proposed scheme is providing the features of signature and encryption in a single cycle to active the basic requirements of low computation and communication cost. The ECC-PSC-IIoT is proven to be secured by using AVISPA tool. Moreover, extensive performance assessment indicates the competency of the proposed scheme with respect to computation and communication time.
引用
收藏
页码:118 / 128
页数:12
相关论文
共 39 条
[1]  
Abdulqadir HR., 2021, Qubahan Academic Journal, V1, P60, DOI DOI 10.48161/QAJ.V1N2A49
[2]   Mobile Edge Computing: Opportunities, solutions, and challenges [J].
Ahmed, Ejaz ;
Rehmani, Mubashir Husain .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 70 :59-63
[3]  
[Anonymous], INT J NETW SECUR, V20, P1183
[4]  
[Anonymous], 2014, AMCIS 2014 P
[5]  
[Anonymous], 2013, PROC FUTURE NETW MOB
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]  
Bhole D., 2016, INT J COMPUTER SCI E, V4, P18
[8]  
Bonomi F., 2012, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, P13, DOI DOI 10.1145/2342509.2342513
[9]   Design and implementation of a cloud encryption transmission scheme supporting integrity verification [J].
Cai, Zengyu ;
Wu, Zuodong ;
Zhang, Jianwei ;
Wang, Wenqian .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (03) :218-228
[10]   Edge servers placement in mobile edge computing using stochastic Petri nets [J].
Carvalho, Daniel ;
Rodrigues, Laecio ;
Endo, Patricia Takako ;
Kosta, Sokol ;
Silva, Francisco Airton .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (04) :352-366