Cost-Effective Proxy Signcryption Scheme for Internet of Things DOI Open Access
Insaf Ullah, Ali Alkhalifah, Muhammad Asghar Khan

et al.

Mobile Information Systems, Journal Year: 2021, Volume and Issue: 2021, P. 1 - 10

Published: Nov. 30, 2021

The Internet of things (IoT) has emerged into a revolutionary technology that enables wide range features and applications given the proliferation sensors actuators embedded in everyday objects, as well ubiquitous availability high-speed Internet. When nearly everything is connected to Internet, security privacy concerns will become more significant. Furthermore, owing resource-constrained nature IoT devices, they are unable perform standard cryptographic computations. As result, there critical need for efficient secure lightweight scheme can meet demands devices. In this study, we propose proxy which person/party delegate its signing authority agent. Existing signcryption approaches computationally costly rely on RSA, bilinear pairing, elliptic curves cryptography (ECC). hyperelliptic curve cryptosystem (HECC), other hand, employs smaller key size while maintaining same level security. assessed using random oracle model (ROM), proposed provides resilience against indistinguishable under adaptive chosen ciphertext attacks (IND-CCA) unforgeable message (UU-ACMA). To demonstrate viability scheme, analyses comparisons with existing schemes performed. findings show high reducing computational communication costs.

Language: Английский

A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT) DOI
Saddam Hussain, Insaf Ullah, Hizbullah Khattak

et al.

Journal of Information Security and Applications, Journal Year: 2021, Volume and Issue: 58, P. 102625 - 102625

Published: Jan. 18, 2021

Language: Английский

Citations

40

Securing Internet of Drones With Identity-Based Proxy Signcryption DOI Creative Commons
Muhammad Asghar Khan, Habib Shah, Sajjad ur Rehman

et al.

IEEE Access, Journal Year: 2021, Volume and Issue: 9, P. 89133 - 89142

Published: Jan. 1, 2021

Internet of Drones (IoD) is a decentralized networking architecture that makes use the internet for uniting drones to enter controlled airspace in coordinated manner. On one hand, this new clan interconnected has ushered era real-world applications; Small drones, on other are generally not designed with security mind, making them exposed fundamental and privacy concerns. Limited computing capabilities, along communication over an open wireless channel, exacerbate these challenges, IoD unfeasible secure operations. In article, we propose identity-based proxy signcryption scheme address issues. During data transfer between cloud server, proposed supports outsourcing decryption member revocation. The based notion Hyper Elliptic Curve Cryptography (HECC), which improves network computation efficiency. We formal analysis Random Oracle Model (ROM) evaluate toughness. performance also been reviewed terms costs relevant existing schemes. results obtained from both analyses affirm superiority scheme.

Language: Английский

Citations

32

An efficient identity-based proxy signcryption using lattice DOI
Hongfei Zhu, Ye Wang, Chonghua Wang

et al.

Future Generation Computer Systems, Journal Year: 2020, Volume and Issue: 117, P. 321 - 327

Published: Dec. 3, 2020

Language: Английский

Citations

21

Certificateless Proxy Signcryption in the Standard Model for a UAV Network DOI
Yunyun Qu, Jiwen Zeng

IEEE Internet of Things Journal, Journal Year: 2022, Volume and Issue: 9(16), P. 15116 - 15127

Published: Jan. 31, 2022

As we all know, the random oracle model (ROM) is a simulation of hash function and cannot replace actual computation public-key cryptography scheme, which was proved to be secure in ROM may insecure when instantiating oracles with concrete functions practical applications. So far as certificateless proxy signcryption (CLPSC) scheme's security only by applying ROM. Therefore, it quite important construct CLPSC scheme standard (SM). In this article, propose first SM, can achieve public verifiability prove that EUF-CMA-CLPSC IND-CCA-CLPSC against type I adversary $\mathcal {A}_{I}$ Type II {A}_{II}$ . Additionally, compare our performance several previous schemes' terms calculation, communication, security. The results show has better performance, suitable for unmanned aerial vehicle network.

Language: Английский

Citations

8

Reliable data sharing in medical cyber physical system using fog computing DOI
Rachana Patil, Arijit Karati, Yogesh H. Patil

et al.

Elsevier eBooks, Journal Year: 2023, Volume and Issue: unknown, P. 67 - 83

Published: Jan. 1, 2023

Language: Английский

Citations

4

Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities DOI Creative Commons
Shafi Ullah, Raja Kamil,

Tulha Moaiz Yazdani

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 35589 - 35604

Published: Jan. 1, 2022

Machine-type communication devices have become a vital part of the autonomous industrial internet things and industry 4.0. These resource-constrained share sensitive data, are primarily acquired for automation to operate consistently in remote environments under severe conditions. The requirements secure data shared between these consist resilient encryption technique with affordable operational costs. Consequently, devices, networks made by adopting lightweight cryptosystem that should achieve robust security sufficient computational costs counter modern threats. This paper offers in-depth studies on different types techniques hardware software-based cryptographies machine-type machine-to-machine networks.

Language: Английский

Citations

7

An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles DOI
Negalign Wake Hundera, Muhammad Umar Aftab,

Dagmawit Mesfin

et al.

Vehicular Communications, Journal Year: 2024, Volume and Issue: 49, P. 100811 - 100811

Published: June 5, 2024

Language: Английский

Citations

1

A delegation model for SDN-driven federated cloud DOI Creative Commons
Adnan Ahmad, Ahmed Alzahrani,

Noman Ahmed

et al.

Alexandria Engineering Journal, Journal Year: 2020, Volume and Issue: 59(5), P. 3653 - 3663

Published: July 2, 2020

The federated cloud paradigm is getting popular for its dynamic allocation of resources, processing power, improved performance, and scalability. A lets multiple service providers collaborate delegate services. However, this delegation requires pre-approval from domain administrators which can create an administrative bottleneck cause serious delays in times need. Despite the recent advancements field, environment still lacks ad-hoc method that allows users to their rights at runtime. Software Defined Network (SDN) provides opportunity enhance performance terms delegating network services among different domains. This paper explores various characteristics SDN-driven proposes a framework enhancing important dimensions. Further, fine-grained model developed supports within environments constituting cloud. CPN based simulation provided rectify any ambiguities practical use. also compared with existing models emphasize significance. results reflect dynamics be efficiently addressed by proposed model.

Language: Английский

Citations

10

Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city DOI
Negalign Wake Hundera, Chuanjie Jin,

Dagmawit Mesfin Geressu

et al.

Multimedia Tools and Applications, Journal Year: 2021, Volume and Issue: 81(21), P. 29673 - 29697

Published: Nov. 22, 2021

Language: Английский

Citations

7

An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks DOI Creative Commons
Negalign Wake Hundera,

Wang Shumeng,

Dagmawit Mesfin

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(5), P. 102044 - 102044

Published: May 4, 2024

The rapid growth of the Internet Things (IoT) has led to an increased deployment unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among primary challenges in UAV networks. In addition, significant communication delays can occur when UAVs perform remote tasks far from a command center (CC); some cases, they may be unable communicate with CC. To address these challenges, this paper, efficient online/offline heterogeneous proxy signcryption scheme for secure networks (HOOPSC) is proposed. This enables CC certificateless cryptosystem (CLC) environment delegate nearby ground control station (GCS) act as agent, directly send commands within identity-based (IBC) undertakes then decrypts verifies authenticity confidentiality. proposed scheme, process split into offline online phases, most heavy computations conducted without availability messages during phase. Only light performed phase message available. Moreover, formal proof given random oracle model. Finally, performance analysis reveals that HOOPSC outperforms existing relevant schemes, making it ideal long-range operations

Language: Английский

Citations

0