Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things

被引:24
作者
Niu, Shufen [1 ]
Shao, Honglin [1 ]
Su, Yun [1 ]
Wang, Caifen [1 ,2 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
[2] Shenzhen Technol Univ, Coll Data & Internet, Shenzhen 518118, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Edge computing; Heterogeneous signcryption; Privacy preservation; ONLINE/OFFLINE SIGNCRYPTION; MULTI-MESSAGE; SECURITY; LIGHTWEIGHT; PRIVACY;
D O I
10.1016/j.sysarc.2023.102836
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the Industrial Internet of Things (IIoT) has played an indispensable role in the age of intelligence. The data of IIoT is extremely private and valuable. Therefore, privacy protection and secure communication in the IIoT have been the focus of attention. Since terminal devices in the IIoT collect massive amounts of sensitive data in real time, traditional cloud computing architectures cannot satisfy the requirements of the IIoT. Edge computing is an emerging computing paradigm to solve the problems of delay and bandwidth in traditional cloud computing architectures. In edge computing architecture, one-to-many communication is a secure and highly efficient communication method. Due to the complex heterogeneity of the IIoT, it faces various potential threats. In order to solve the dilemma mentioned above, we propose an efficient heterogeneous signcryption scheme based on edge computing for IIoT to achieve multi-message and multi-receiver communication between edge servers and data users, where the edge server belongs to identity-based cryptography while data users belong to certificateless cryptography. In the random oracle model, our proposed scheme is proved to satisfy confidentiality and unforgeability based on the discrete logarithm assumption and the computational Diffie-Hellman assumption. Experimental results indicate that our proposal achieves better performance than existing schemes. Hence, our scheme has more advantages for IIoT.
引用
收藏
页数:13
相关论文
共 33 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103
[5]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[6]   Formal proofs for the security of signcryption [J].
Baek, Joonsang ;
Steinfeld, Ron ;
Zheng, Yuliang .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :203-235
[7]   Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices [J].
Chen, Jiasheng ;
Wang, Liangliang ;
Wen, Mi ;
Zhang, Kai ;
Chen, Kefei .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8967-8979
[8]   Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges [J].
Gebremichael, Teklay ;
Ledwaba, Lehlogonolo P. I. ;
Eldefrawy, Mohamed H. ;
Hancke, Gerhard P. ;
Pereira, Nuno ;
Gidlund, Mikael ;
Akerberg, Johan .
IEEE ACCESS, 2020, 8 :152351-152366
[9]   A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities [J].
Han, Jing ;
Li, Yanping ;
Chen, Weifeng .
COMPUTER STANDARDS & INTERFACES, 2019, 62 :84-97
[10]   SPTM-EC: A Security and Privacy-Preserving Task Management in Edge Computing for IIoT [J].
Hosen, A. S. M. Sanwar ;
Sharma, Pradip Kumar ;
Ra, In-Ho ;
Cho, Gi Hwan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6330-6339