Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things

被引:2
作者
Ahmed, Adel A. [1 ]
Barukab, Omar M. [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Informat Technol Dept, Jeddah 25729, Saudi Arabia
关键词
IoT; ECDH; digital signature; random oracle model; AUTHENTICATION SCHEME; USER AUTHENTICATION; SECURITY SCHEME; CRYPTOGRAPHY; FRAMEWORK; ALGORITHM; ECC;
D O I
10.3390/pr10122631
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Cybersecurity protocols enable several levels of protection against cyberattacks (digital attacks) that spread across network devices, platform programs, and network applications. On the Internet of Things (IoT), cyberattacks are generally intended to access and change/destroy sensitive information, which may reduce IoT benefits. Moreover, recent IoT systems are experiencing a critical challenge in designing a lightweight and robust cybersecurity mechanism on resource-constrained IoT devices. The cybersecurity challenges facing the IoT that should be taken into consideration are identifying compromised devices, data/service protection, and identifying impacted IoT users. This paper proposes an unforgeable digital signature integrated into an effective lightweight encryption (ELCD) mechanism that utilizes the secure key distribution in an elliptic curve Diffie-Hellman (ECDH) and resolves the weak bit problem in the shared secret key due to the Diffie-Hellman exchange. The ELCD mechanism proposes a secure combination between the digital signature and encryption, and it uses fast hash functions to confidentially transfer a shared secret key among IoT devices over an insecure communication channel. Furthermore, the ELCD mechanism checks the true identity of the sender with certainty through the proposed digital signature, which works based on a hash function and three steps of curve-point inspection. Furthermore, the security of ELCD was mathematically proven using the random oracle and IoT adversary models. The findings of the emulation results show the effectiveness of ELCD in terms of CPU execution time, storage cost, and power consumption that are less by 53.8%, 33-17%, and 68.7%, respectively, compared to the baseline cryptographic algorithms.
引用
收藏
页数:27
相关论文
共 43 条
[1]  
Abdullah J., 2017, J. Telecommun., Electron. Comput. Eng. (JTEC), V9, P99
[2]   A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication [J].
Abro, Adeel ;
Deng, Zhongliang ;
Memon, Kamran Ali .
FUTURE INTERNET, 2019, 11 (05)
[3]   Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things [J].
Ahmed, Adel A. .
SENSORS, 2021, 21 (08)
[4]   An optimal complexity H.264/AVC encoding for video streaming over next generation of wireless multimedia sensor networks [J].
Ahmed, Adel A. .
SIGNAL IMAGE AND VIDEO PROCESSING, 2016, 10 (06) :1143-1150
[5]   An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things [J].
Ahmed, Adel Ali ;
Ahmed, Waleed Ali .
SENSORS, 2019, 19 (17)
[6]   An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things [J].
Alamer, Abdulrahman .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) :5885-5902
[7]  
[Anonymous], MININET IOT EMULATOR
[8]  
[Anonymous], ENCR
[9]  
[Anonymous], 2007, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
[10]  
Biryukov A., 2011, Encyclopedia of cryptography and security