An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature

被引:4
作者
Muhammad, Ali [1 ]
Ul Amin, Noor [1 ]
Ullah, Insaf [2 ]
Alsanad, Ahmed [3 ]
Hussain, Saddam [1 ]
Al-Hadhrami, Suheer [4 ]
Uddin, M. Irfan [5 ]
Khattak, Hizbullah [1 ]
Khan, Muhammad Asghar [2 ]
机构
[1] Hazara Univ, Dept Informat Technol, Mansehra 21120, Khyber Pakhtunk, Pakistan
[2] Hamdard Univ, Hamdard Inst Engn & Technol, Islamabad 44000, Pakistan
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, STCs Artificial Intelligence Chair, Riyadh 11543, Saudi Arabia
[4] Hadhramout Univ, Engn Coll, Comp Engn Dept, Hadhramout, Yemen
[5] Kohat Univ Sci & Technol, Inst Comp, Kohat 2600, Pakistan
关键词
SECURE; LIGHTWEIGHT; ENCRYPTION;
D O I
10.1155/2021/9960264
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Currently, hyperelliptic curve cryptography (HECC) got attractions towards low power devices such as Industrial Internet of Things (IIoT). As we all know, it has the capability of utilizing low key size, which can be suitable for IIoT environment. Inspired by the aforementioned property of HECC, we proposed an efficient scheme for IIoT using certificateless signature with the help of HECC. The presented approach is proven to be unforgeable against the challenges of type I and type II attackers. We tested the security of the designed approach through Automated Validation of Internet Security Protocols and Applications (AVISPA). We also performed the computational and communicational cost comparisons with already existed schemes, and it is observed from our analysis that our scheme is computationally efficient and needs low communication cost.
引用
收藏
页数:11
相关论文
共 55 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Mutual Authentication in IoT Systems Using Physical Unclonable Functions
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1327 - 1340
  • [3] Amini F, 2012, ENCY WIRELESS MOBILE
  • [4] [Anonymous], 2017, SECUR COMMUN NETW, DOI DOI 10.1155/2017/8405879
  • [5] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [6] PUF Based Authentication Protocol for IoT
    Braeken, An
    [J]. SYMMETRY-BASEL, 2018, 10 (08):
  • [7] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [8] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [9] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [10] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208