Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices

被引:268
作者
Wang, Weizheng [1 ,2 ]
Xu, Hao [3 ]
Alazab, Mamoun [4 ,7 ]
Gadekallu, Thippa Reddy [5 ]
Han, Zhaoyang [2 ]
Su, Chunhua [2 ,6 ]
机构
[1] City Univ Hong Kong, Comp Sci Dept, Kowloon Tong, Peoples R China
[2] Univ Aizu, Div Comp Sci, Fukushima 9658580, Japan
[3] Yangzhou Univ, Coll Informat Engn, Yangzhou 225127, Jiangsu, Peoples R China
[4] Melbourne Polytech, Dept IT, Prahran Campus, Melbourne, Vic 3181, Australia
[5] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[6] Peng Cheng Lab, Shenzhen 518066, Peoples R China
[7] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT, Australia
关键词
Industrial Internet of Things; Security; Smart contracts; Elliptic curves; 5G mobile communication; Generators; Denial-of-service attack; Blockchain; certificateless signature (CLS); Industrial Internet of Things (IIOT); Internet of Things (IoT); security and privacy; PROVABLY-SECURE; SCHEME;
D O I
10.1109/TII.2021.3084753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which brings tremendous associations with all walks of life, such as intelligent logistics, smart grid, and smart city. Moreover, with the rapid increase of IIoT devices, a large amount of data is swapped between heterogeneous sensors and devices every moment. This trend increases the risk of eavesdropping and hijacking attacks in communication channels, so maintaining data privacy and security becomes two notable concerns at present. Recently, based on the mechanism of the Schnorr signature, a more secure and lightweight certificateless signature (CLS) protocol is popular for the resource-constrained IIoT protocol design. Nevertheless, we found most of the existing CLS schemes are susceptible to several common security weaknesses such as man-in-the-middle attacks, key generation center compromised attacks, and distributed denial of service attacks. To tackle the challenges mentioned previously, in this article, we propose a novel pairing-free certificateless scheme that utilizes the state-of-the-art blockchain technique and smart contract to construct a novel reliable and efficient CLS scheme. Then, we simulate the Type-I and Type-II adversaries to verify the trustworthiness of our scheme. Security analysis as well as performance evaluation outcomes prove that our design can hold more reliable security assurance with less computation cost (i.e., reduced by around 40.0% at most) and communication cost (i.e., reduced by around 94.7% at most) than other related schemes.
引用
收藏
页码:7059 / 7067
页数:9
相关论文
共 23 条
[1]   Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision [J].
Abbasinezhad-Mood, Dariush ;
Mazinani, Sayyed Majid ;
Nikooghadam, Morteza ;
Ostad-Sharif, Arezou .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1227-1238
[2]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Further improvement of a certificateless signature scheme without pairing [J].
Gong, Peng ;
Li, Ping .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :2083-2091
[6]   Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment [J].
Jangirala, Srinivas ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) :7081-7093
[7]   An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment [J].
Jia, Xiaoying ;
He, Debiao ;
Liu, Qin ;
Choo, Kim-Kwang Raymond .
AD HOC NETWORKS, 2018, 71 :78-87
[8]   Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments [J].
Karati, Arijit ;
Islam, S. K. Hafizul ;
Karuppiah, Marimuthu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3701-3711
[9]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552
[10]  
Pakniat N., 2018, P 15 INT ISC IR SOC, P1, DOI DOI 10.1109/ISCISC.2018.8546984