A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment

被引:3
作者
Patil, Rachana Y. [1 ]
Patil, Yogesh H. [2 ]
机构
[1] Pimpri Chinchwad Coll Engn, Pune, Maharashtra, India
[2] VBK Infra & Engn Projects, IME Div, Pune 11014, Maharashtra, India
关键词
internet of things; IoT; elliptic curve cryptography; ECC; signcryption; fog computing; proxy signature; INTERNET; CLOUD; ENCRYPTION; SYSTEMS; THINGS;
D O I
10.1504/IJCSE.2023.129743
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Rapid technical advancements have transformed the industrial segment. The internet limits the meaning of industrial IoT (IIoT) to the production Industry, which is Industry 4.0. IIoT includes sensors, positioners, and actuators. As a result, various forms of data is produced. Due to delays and safety issues, most industrial processes must be completed locally before data sent to cloud. Fog computing's localised data processing makes it a suitable mediator. Industrial data is regularly shared among different applications for analysis, decision-making, and research. Here, we proposed an ECC-based proxy signcryption for IIoT (ECC-PSC-IIoT) in a fog computing environment. The proposed scheme is providing the features of signature and encryption in a single cycle to active the basic requirements of low computation and communication cost. The ECC-PSC-IIoT is proven to be secured by using AVISPA tool. Moreover, extensive performance assessment indicates the competency of the proposed scheme with respect to computation and communication time.
引用
收藏
页码:118 / 128
页数:12
相关论文
共 50 条
[41]   A secure and robust scheme for sharing confidential information in IoT systems [J].
Bu, Lake ;
Isakov, Mihailo ;
Kinsy, Michel A. .
AD HOC NETWORKS, 2019, 92
[42]   Privacy preservation and secure data sharing scheme in fog based vehicular ad-hoc network [J].
Navdeti, Chandrakant P. ;
Banerjee, Indrajit ;
Giri, Chandan .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
[43]   Mutual authentication scheme of IoT devices in fog computing environment [J].
Singh, Sunakshi ;
Chaurasiya, Vijay Kumar .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03) :1643-1657
[44]   An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission [J].
Chinnappa, A. ;
Vijayakumaran, C. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02) :4017-4031
[45]   A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System [J].
Sun, Shuang ;
Du, Rong ;
Chen, Shudong .
INFORMATION, 2021, 12 (02) :1-20
[46]   Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT [J].
Wei, Xin ;
Yan, Yong ;
Guo, Shaoyong ;
Qiu, Xuesong ;
Qi, Feng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8143-8153
[47]   A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT [J].
Deng, Hua ;
Qin, Zheng ;
Sha, Letian ;
Yin, Hui .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12) :11601-11611
[48]   Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments [J].
Lin, Han-Yu ;
Chen, Pei-Ru .
SENSORS, 2024, 24 (19)
[49]   Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT [J].
Vinoth, R. ;
Deborah, Lazarus Jegatha ;
Vijayakumar, Pandi ;
Kumar, Neeraj .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3801-3811
[50]   Secure data access using blockchain technology through IoT cloud and fabric environment [J].
Gupta, Sangeeta ;
Chithaluru, Premkumar ;
El Barachi, May ;
Kumar, Manoj .
SECURITY AND PRIVACY, 2024, 7 (02)