An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments
نویسندگان
چکیده
When the Wireless Sensor Network (WSN) is combined with Internet of Things (IoT), it can be employed in a wide range applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing big data generated by these applications Cloud Servers (CSs), requires higher levels authenticity and confidentiality during communication conducted through Internet. Signcryption one most promising approaches nowadays for overcoming obstacles, due to its nature, i.e., signature encryption. A number researchers have developed schemes address issues related access control IoT literature, however, majority are based on homogeneous nature. This will neither adequate nor practical heterogeneous environments. In addition, bilinear pairing elliptic curve cryptography, which further additional processing time more overheads that inappropriate real-time communication. Consequently, this paper aims solve above-discussed issues, we proposed an scheme environments using signcryption efficiency security hardiness hyperelliptic curve. Besides services replay attack prevention, confidentiality, integrity, unforgeability, non-repudiations, forward secrecy, has very low computational costs, when compared existing schemes. primarily because lighter nature key other parameters. The AVISPA tool used simulate requirements our results were under two backbends (Constraint Logic-based Attack Searcher (CL-b-AtSER) On-the-Fly Model Checker (ON-t-FL-MCR)) proved SAFE presented coded HLPSL language. was proven capable preventing variety attacks, including non-repudiation, attacks.
منابع مشابه
Attribute-Based Access Control Scheme in Federated IoT Platforms
The Internet of Things (IoT) introduced the possibility to connect electronic things from everyday life to the Internet, while making them ubiquitously available. With advanced IoT services, based on a trusted federation among heterogeneous IoT platforms, new security problems (including authentication and authorization) emerge. This contribution aims at describing the main facets of the prelim...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملAn Eecient Scheme for Secure Message Transmission Using Proxy-signcryption
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not seriall...
متن کاملAn Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
Y. Zheng introduced a new cryptographic primitive Signcryption in [12], which combines digital signature function with a symmetric key encryption algorithm. A digital signature is used for authentication of message and an encryption scheme is used for the confidentiality of messages. A signcryption offers these two properties at the same time and more efficiently. Computational cost in Signcryp...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.017380