A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network

被引:3
作者
Chen, Ming-Te [1 ]
Huang, Hsuan-Chao [1 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41170, Taiwan
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 01期
关键词
sign-cryption; unsign-cryption; cryptography module; IoT device; AUTHENTICATION SCHEME; INTERNET; IMPLEMENTATION;
D O I
10.3390/app12010278
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In recent years, Internet of Things (IoT for short) research has become one of the top ten most popular research topics. IoT devices also embed many sensing chips for detecting physical signals from the outside environment. In the wireless sensing network (WSN for short), a human can wear several IoT devices around her/his body such as a smart watch, smart band, smart glasses, etc. These IoT devices can collect analog environment data around the user's body and store these data into memory after data processing. Thus far, we have discovered that some IoT devices have resource limitations such as power shortages or insufficient memory for data computation and preservation. An IoT device such as a smart band attempts to upload a user's body information to the cloud server by adopting the public-key crypto-system to generate the corresponding cipher-text and related signature for concrete data security; in this situation, the computation time increases linearly and the device can run out of memory, which is inconvenient for users. For this reason, we consider that, if the smart IoT device can perform encryption and signature simultaneously, it can save significant resources for the execution of other applications. As a result, our approach is to design an efficient, practical, and lightweight, blind sign-cryption (SC for short) scheme for IoT device usage. Not only can our methodology offer the sensed data privacy protection efficiently, but it is also fit for the above application scenario with limited resource conditions such as battery shortage or less memory space in the IoT device network.
引用
收藏
页数:13
相关论文
共 21 条
[1]  
[Anonymous], 2006, THESIS MIT CAMBRIDGE
[2]   A pairing SW implementation for smart-cards [J].
Bertoni, Guido M. ;
Breveglieri, Luca ;
Chen, Liqun ;
Fragneto, Pasqualina ;
Harrison, Keith A. ;
Pelosi, Gerardo .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) :1240-1247
[3]  
Fan CI, 2002, J INF SCI ENG, V18, P47
[4]   A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT) [J].
Hammi, Badis ;
Fayad, Achraf ;
Khatoun, Rida ;
Zeadally, Sherali ;
Begriche, Youcef .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3440-3450
[5]  
Hankerson D, 2009, CRYPTOL INF SEC SER, V2, P188, DOI 10.3233/978-1-58603-947-9-188
[6]   PUF based IoT Device Authentication Scheme [J].
Kim, Byoungkoo ;
Yoon, Seoungyong ;
Kang, Yousung ;
Choi, Dooho .
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, :1460-1462
[7]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[8]  
Kwak J., 2019, P 2019 INT C PLATFOR, P1
[9]   The advantages of elliptic curve cryptography for wireless security [J].
Lauter, K .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :62-67
[10]   Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things [J].
Li, Fagen ;
Xiong, Pan .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3677-3684