Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network

被引:37
|
作者
Ting, Pei-Yih [1 ]
Tsai, Jia-Lun [2 ]
Wu, Tzong-Sun [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 03期
关键词
Identity-based cryptosystem (IBC); Internet of Things (IoT); public key infrastructure (PKI); signcryption; wireless sensor network (WSN); SECURITY; INTERNET; EFFICIENT; IDENTITY; SCHEME; AUTHENTICATION; SIGNATURE; THINGS;
D O I
10.1109/JSYST.2017.2730580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) consists of scenarios in which real-world appliances, objects, animals or people with unique identifiers transfer data over an insecure wireless network to accomplish specific tasks without any physical interaction. To achieve the specified goal, wireless sensor networks (WSNs) are usually connected to the Internet and integrated as part of the IoT. In such environments, how to send a message securely from a sensor to an Internet host becomes an important issue for the successful functioning of the IoT. In this paper, a new, efficient, heterogeneous online/offline signcryption scheme is proposed. This scheme achieves the security goals of confidentiality, integrity, authentication, and nonrepudiation in a logical single step. In particular, its structure allows a sensor node in an identity-based cryptography (IBC) setup to send a message to an Internet host in a public key infrastructure (PKI) such that the heavy verification loads on low-power devices are mitigated. The proposed signcryption scheme is divided into the offline and the online signcrypt stages for further load mitigation. The first stage handles most part of computations in generating a ciphertext before knowing the message. Only a few operations are left for the second stage when the messages show up. This scheme is indistinguishable against adaptive chosen-ciphertext attacks under the computational Diffie-Hellman assumption, and is unforgeable against adaptive chosen-message attacks under the elliptic curve discrete logarithm assumption. As compared with other related works, the proposed scheme has lower computation costs on both the sensor and the host sides and is more power efficient and scalable for various IoT scenarios.
引用
收藏
页码:2385 / 2394
页数:10
相关论文
共 50 条
  • [31] Low-Power RFED Wake-Up Receiver Design for Low-Cost Wireless Sensor Network Applications
    Galante-Sempere, David
    Ramos-Valido, Dailos
    Lalchand Khemchandani, Sunil
    del Pino, Javier
    SENSORS, 2020, 20 (22) : 1 - 16
  • [32] Low-Power MCU With Embedded ReRAM Buffers as Sensor Hub for IoT Applications
    Chien, Tsai-Kan
    Chiou, Lih-Yih
    Sheu, Shyh-Shyuan
    Lin, Jing-Cian
    Lee, Chang-Chia
    Ku, Tzu-Kun
    Tsai, Ming-Jinn
    Wu, Chih-I
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2016, 6 (02) : 247 - 257
  • [33] Low-Power Digital Signal Processor Architecture for Wireless Sensor Nodes
    Walravens, Cedric
    Dehaene, Wim
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (02) : 313 - 321
  • [34] Learning-Based Resource Management for Low-Power and Lossy IoT Networks
    Musaddiq, Arslan
    Ali, Rashid
    Kim, Sung Won
    Kim, Dong-Seong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17): : 16006 - 16016
  • [35] IoT Based Wireless Sensor Network for Power Quality Control in Smart Grid
    Bagdadee, Amam Hossain
    Hoque, Md Zahirul
    Zhang, Li
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1148 - 1160
  • [36] Data Transmission and Network Architecture in Long Range Low Power Sensor Networks for IoT
    Kim, Dae-Young
    Jung, Minwoo
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (01) : 119 - 129
  • [37] Service Management for Enabling Self-Awareness in Low-Power IoT Edge Devices
    Attarha, Shadi
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [38] Review of Routing Protocol in a Wireless Sensor Network for an IOT Application
    Mahakalkar, Namrata
    Pethe, Rahul
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 21 - 25
  • [39] Public Blockchain-Based Data Integrity Verification for Low-Power IoT Devices
    Khor, Jing Huey
    Sidorov, Michail
    Ong, Ming Tze
    Chua, Shen Yik
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 13056 - 13064
  • [40] Low-Power Beam-Switching Technique for Power-Efficient Collaborative IoT Edge Devices
    Oh, Semyoung
    Park, Daejin
    APPLIED SCIENCES-BASEL, 2021, 11 (04): : 1 - 14