Mobile Information Systems,
Journal Year:
2021,
Volume and Issue:
2021, P. 1 - 10
Published: Nov. 30, 2021
The
Internet
of
things
(IoT)
has
emerged
into
a
revolutionary
technology
that
enables
wide
range
features
and
applications
given
the
proliferation
sensors
actuators
embedded
in
everyday
objects,
as
well
ubiquitous
availability
high-speed
Internet.
When
nearly
everything
is
connected
to
Internet,
security
privacy
concerns
will
become
more
significant.
Furthermore,
owing
resource-constrained
nature
IoT
devices,
they
are
unable
perform
standard
cryptographic
computations.
As
result,
there
critical
need
for
efficient
secure
lightweight
scheme
can
meet
demands
devices.
In
this
study,
we
propose
proxy
which
person/party
delegate
its
signing
authority
agent.
Existing
signcryption
approaches
computationally
costly
rely
on
RSA,
bilinear
pairing,
elliptic
curves
cryptography
(ECC).
hyperelliptic
curve
cryptosystem
(HECC),
other
hand,
employs
smaller
key
size
while
maintaining
same
level
security.
assessed
using
random
oracle
model
(ROM),
proposed
provides
resilience
against
indistinguishable
under
adaptive
chosen
ciphertext
attacks
(IND-CCA)
unforgeable
message
(UU-ACMA).
To
demonstrate
viability
scheme,
analyses
comparisons
with
existing
schemes
performed.
findings
show
high
reducing
computational
communication
costs.
IEEE Access,
Journal Year:
2021,
Volume and Issue:
9, P. 89133 - 89142
Published: Jan. 1, 2021
Internet
of
Drones
(IoD)
is
a
decentralized
networking
architecture
that
makes
use
the
internet
for
uniting
drones
to
enter
controlled
airspace
in
coordinated
manner.
On
one
hand,
this
new
clan
interconnected
has
ushered
era
real-world
applications;
Small
drones,
on
other
are
generally
not
designed
with
security
mind,
making
them
exposed
fundamental
and
privacy
concerns.
Limited
computing
capabilities,
along
communication
over
an
open
wireless
channel,
exacerbate
these
challenges,
IoD
unfeasible
secure
operations.
In
article,
we
propose
identity-based
proxy
signcryption
scheme
address
issues.
During
data
transfer
between
cloud
server,
proposed
supports
outsourcing
decryption
member
revocation.
The
based
notion
Hyper
Elliptic
Curve
Cryptography
(HECC),
which
improves
network
computation
efficiency.
We
formal
analysis
Random
Oracle
Model
(ROM)
evaluate
toughness.
performance
also
been
reviewed
terms
costs
relevant
existing
schemes.
results
obtained
from
both
analyses
affirm
superiority
scheme.
IEEE Internet of Things Journal,
Journal Year:
2022,
Volume and Issue:
9(16), P. 15116 - 15127
Published: Jan. 31, 2022
As
we
all
know,
the
random
oracle
model
(ROM)
is
a
simulation
of
hash
function
and
cannot
replace
actual
computation
public-key
cryptography
scheme,
which
was
proved
to
be
secure
in
ROM
may
insecure
when
instantiating
oracles
with
concrete
functions
practical
applications.
So
far
as
certificateless
proxy
signcryption
(CLPSC)
scheme's
security
only
by
applying
ROM.
Therefore,
it
quite
important
construct
CLPSC
scheme
standard
(SM).
In
this
article,
propose
first
SM,
can
achieve
public
verifiability
prove
that
EUF-CMA-CLPSC
IND-CCA-CLPSC
against
type
I
adversary
$\mathcal
{A}_{I}$
Type
II
{A}_{II}$
.
Additionally,
compare
our
performance
several
previous
schemes'
terms
calculation,
communication,
security.
The
results
show
has
better
performance,
suitable
for
unmanned
aerial
vehicle
network.
IEEE Access,
Journal Year:
2022,
Volume and Issue:
10, P. 35589 - 35604
Published: Jan. 1, 2022
Machine-type
communication
devices
have
become
a
vital
part
of
the
autonomous
industrial
internet
things
and
industry
4.0.
These
resource-constrained
share
sensitive
data,
are
primarily
acquired
for
automation
to
operate
consistently
in
remote
environments
under
severe
conditions.
The
requirements
secure
data
shared
between
these
consist
resilient
encryption
technique
with
affordable
operational
costs.
Consequently,
devices,
networks
made
by
adopting
lightweight
cryptosystem
that
should
achieve
robust
security
sufficient
computational
costs
counter
modern
threats.
This
paper
offers
in-depth
studies
on
different
types
techniques
hardware
software-based
cryptographies
machine-type
machine-to-machine
networks.
Alexandria Engineering Journal,
Journal Year:
2020,
Volume and Issue:
59(5), P. 3653 - 3663
Published: July 2, 2020
The
federated
cloud
paradigm
is
getting
popular
for
its
dynamic
allocation
of
resources,
processing
power,
improved
performance,
and
scalability.
A
lets
multiple
service
providers
collaborate
delegate
services.
However,
this
delegation
requires
pre-approval
from
domain
administrators
which
can
create
an
administrative
bottleneck
cause
serious
delays
in
times
need.
Despite
the
recent
advancements
field,
environment
still
lacks
ad-hoc
method
that
allows
users
to
their
rights
at
runtime.
Software
Defined
Network
(SDN)
provides
opportunity
enhance
performance
terms
delegating
network
services
among
different
domains.
This
paper
explores
various
characteristics
SDN-driven
proposes
a
framework
enhancing
important
dimensions.
Further,
fine-grained
model
developed
supports
within
environments
constituting
cloud.
CPN
based
simulation
provided
rectify
any
ambiguities
practical
use.
also
compared
with
existing
models
emphasize
significance.
results
reflect
dynamics
be
efficiently
addressed
by
proposed
model.
Journal of King Saud University - Computer and Information Sciences,
Journal Year:
2024,
Volume and Issue:
36(5), P. 102044 - 102044
Published: May 4, 2024
The
rapid
growth
of
the
Internet
Things
(IoT)
has
led
to
an
increased
deployment
unmanned
aerial
vehicles
(UAVs)
across
various
sectors.
However,
efficiency
and
security
issues
are
persistently
among
primary
challenges
in
UAV
networks.
In
addition,
significant
communication
delays
can
occur
when
UAVs
perform
remote
tasks
far
from
a
command
center
(CC);
some
cases,
they
may
be
unable
communicate
with
CC.
To
address
these
challenges,
this
paper,
efficient
online/offline
heterogeneous
proxy
signcryption
scheme
for
secure
networks
(HOOPSC)
is
proposed.
This
enables
CC
certificateless
cryptosystem
(CLC)
environment
delegate
nearby
ground
control
station
(GCS)
act
as
agent,
directly
send
commands
within
identity-based
(IBC)
undertakes
then
decrypts
verifies
authenticity
confidentiality.
proposed
scheme,
process
split
into
offline
online
phases,
most
heavy
computations
conducted
without
availability
messages
during
phase.
Only
light
performed
phase
message
available.
Moreover,
formal
proof
given
random
oracle
model.
Finally,
performance
analysis
reveals
that
HOOPSC
outperforms
existing
relevant
schemes,
making
it
ideal
long-range
operations