An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment

被引:29
作者
Huang, Haiping [1 ]
Wu, Yuhan [1 ]
Xiao, Fu [1 ]
Malekian, Reza [2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Peoples R China
[2] Malmo Univ, Dept Comp Sci & Media Technol, S-21119 Malmo, Sweden
[3] Univ Pretoria, Dept Elect Elect & Comp Engn, ZA-0028 Pretoria, South Africa
基金
中国国家自然科学基金;
关键词
Security; Internet of Things; Authentication; Edge computing; Cryptography; Computer architecture; Pollution; Batch verification; certificateless signature; Internet of Things (IoT); mobile edge computing (MEC); named data networking (NDN); NAMED DATA NETWORKING; SECURITY; INTERNET; ATTACK;
D O I
10.1109/TCSS.2021.3076209
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.
引用
收藏
页码:1108 / 1120
页数:13
相关论文
共 39 条
[1]   A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era [J].
Abualsaud, Khalid ;
Elfouly, Tarek M. ;
Khattab, Tamer ;
Yaacoub, Elias ;
Ismail, Loay Sabry ;
Ahmed, Mohamed Hossam ;
Guizani, Mohsen .
IEEE ACCESS, 2019, 7 :3855-3881
[2]  
Ahmed A, 2016, PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16)
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
Amadeo M, 2018, 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P80, DOI 10.1109/WF-IoT.2018.8355230
[5]   NDNe: Enhancing Named Data Networking to Support Cloudification at the Edge [J].
Amadeo, Marica ;
Campolo, Claudia ;
Molinaro, Antonella .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (11) :2264-2267
[6]  
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[7]  
Ao J, INT J NETWORK SECURI, V12, P1
[8]  
Asami Tohru, 2015, P 2 ACM C INF CENTR, P157
[9]   Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking [J].
Babu, Varghese Jensy ;
Jose, M. Victor .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (01) :557-574
[10]   A Survey on Multimodal Data-Driven Smart Healthcare Systems: Approaches and Applications [J].
Cai, Qiong ;
Wang, Hao ;
Li, Zhenmin ;
Liu, Xiao .
IEEE ACCESS, 2019, 7 :133583-133599