An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature

被引:4
作者
Muhammad, Ali [1 ]
Ul Amin, Noor [1 ]
Ullah, Insaf [2 ]
Alsanad, Ahmed [3 ]
Hussain, Saddam [1 ]
Al-Hadhrami, Suheer [4 ]
Uddin, M. Irfan [5 ]
Khattak, Hizbullah [1 ]
Khan, Muhammad Asghar [2 ]
机构
[1] Hazara Univ, Dept Informat Technol, Mansehra 21120, Khyber Pakhtunk, Pakistan
[2] Hamdard Univ, Hamdard Inst Engn & Technol, Islamabad 44000, Pakistan
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, STCs Artificial Intelligence Chair, Riyadh 11543, Saudi Arabia
[4] Hadhramout Univ, Engn Coll, Comp Engn Dept, Hadhramout, Yemen
[5] Kohat Univ Sci & Technol, Inst Comp, Kohat 2600, Pakistan
关键词
SECURE; LIGHTWEIGHT; ENCRYPTION;
D O I
10.1155/2021/9960264
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Currently, hyperelliptic curve cryptography (HECC) got attractions towards low power devices such as Industrial Internet of Things (IIoT). As we all know, it has the capability of utilizing low key size, which can be suitable for IIoT environment. Inspired by the aforementioned property of HECC, we proposed an efficient scheme for IIoT using certificateless signature with the help of HECC. The presented approach is proven to be unforgeable against the challenges of type I and type II attackers. We tested the security of the designed approach through Automated Validation of Internet Security Protocols and Applications (AVISPA). We also performed the computational and communicational cost comparisons with already existed schemes, and it is observed from our analysis that our scheme is computationally efficient and needs low communication cost.
引用
收藏
页数:11
相关论文
共 55 条
  • [21] Security, Privacy, and Trust on Internet of Things
    Kolias, Constantinos
    Meng, Weizhi
    Kambourakis, Georgios
    Chen, Jiageng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [22] DDoS in the IoT: Mirai and Other Botnets
    Kolias, Constantinos
    Kambourakis, Georgios
    Stavrou, Angelos
    Voas, Jeffrey
    [J]. COMPUTER, 2017, 50 (07) : 80 - 84
  • [23] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (12) : 6428 - 6453
  • [24] Hiding sensitive itemsets with multiple objective optimization
    Lin, Jerry Chun-Wei
    Zhang, Yuyu
    Zhang, Binbin
    Fournier-Viger, Philippe
    Djenouri, Youcef
    [J]. SOFT COMPUTING, 2019, 23 (23) : 12779 - 12797
  • [25] Mining of skyline patterns by considering both frequent and utility constraints
    Lin, Jerry Chun-Wei
    Yang, Lu
    Fournier-Viger, Philippe
    Hong, Tzung-Pei
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 77 : 229 - 238
  • [26] Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks
    Naresh, Vankamamidi S.
    Sivaranjani, Reddi
    Murthy, Nistala V. E. S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (15)
  • [27] Cyberentity Security in the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Yang, Laurence T.
    [J]. COMPUTER, 2013, 46 (04) : 46 - 53
  • [28] Current research on Internet of Things (IoT) security: A survey
    Noor, Mardiana Binti Mohamad
    Hassan, Wan Haslina
    [J]. COMPUTER NETWORKS, 2019, 148 : 283 - 294
  • [29] Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network
    Omala, Anyembe Andrew
    Mbandu, Angolo Shem
    Mutiria, Kamenyi Domenic
    Jin, Chunhua
    Li, Fagen
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (06)
  • [30] α-Fraction First Strategy for Hierarchical Model in Wireless Sensor Networks
    Pan, Jeng-Shyang
    Kong, Lingping
    Sung, Tien-Wen
    Tsai, Pei-Wei
    Snasel, Vaclav
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1717 - 1726