Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things

被引:15
作者
Naresh, Vankamamidi Srinivasa [1 ]
Reddi, Sivaranjani [2 ]
Kumari, Saru [3 ]
Allavarpu, V. V. L. Divakar [4 ]
Kumar, Sachin [5 ]
Yang, Ming-Hour [6 ]
机构
[1] Sri Vasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudeam 534101, India
[2] Anil Neerukonda Inst Technol & Sci, Dept Comp Sci & Engn, Visakhapatnam 530003, Andhra Pradesh, India
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] GITAM Inst Management GITAM Deemed Be Univ, FinTech Acad, Visakhapatnam 530045, Andhra Pradesh, India
[5] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad 201009, India
[6] Chung Yuan Christian Univ, Chungli 32023, Taiwan
关键词
Security; Encryption; Sun; Servers; Privacy; Licenses; Internet of Things; Bilinear pairing; certificateless signcryption; HOOSC; heterogeneous; identity based cryptography; online; off-line signcryption; SIGNATURE SCHEME; EFFICIENT;
D O I
10.1109/ACCESS.2021.3055148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary developments in providing proper security in the Internet of Things (IoT) have been made signcryption scheme highly suitable for various applications such as smart cities, smart healthcare and smart agriculture. However, security and privacy are the primary concerns in protecting data as it was highly sensitive. This paper is proposing a new Identity based online/off-line signcryption scheme suitable to provide secure message communication among IoT devices, gateway, and the server. This method is divided into the online and offline phases, where heavy mathematical computations are carried out in the offline phase and light computations in the online phase. This scheme provides a security solution for integrating Wireless Sensor Networks (WSNs) into the IoT. Experimentation was done and finally compared against existing techniques and proved that the proposed mechanism reduces the computation time in online by performing a greater number of operations in off-line signcryption phase. Further, it provides indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen messages attacks.
引用
收藏
页码:21267 / 21278
页数:12
相关论文
共 46 条
  • [1] Amin N, 2019, INT J DISTRIB SENSOR, V15, P1
  • [2] An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
  • [3] Balasubramanian V., 2019, APPL MATH INFORM SCI, V13, P31, DOI [10.18576/amis/130105, DOI 10.18576/AMIS/130105]
  • [4] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
  • [5] Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
  • [6] Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362
  • [7] Chow SSM, 2004, LECT NOTES COMPUT SC, V2971, P352
  • [8] Cui S., 2007, Int. J. Netw. Secur., V5, P89
  • [9] Even S, 1996, J CRYPTOL, V9, P35, DOI 10.1007/BF02254791
  • [10] On the energy cost of authenticated key agreement in wireless sensor networks
    Galindo, David
    Roman, Rodrigo
    Lopez, Javier
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (01) : 133 - 143