Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves

Author:

Khan Junaid1ORCID,Zhu Congxu1ORCID,Ali Wajid1ORCID,Asim Muhammad23ORCID,Ahmad Sadique2ORCID

Affiliation:

1. School of Computer Science and Engineering, Central South University, Changsha 410083, China

2. EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia

3. School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China

Abstract

Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication. Traditional schemes are based on the main mathematical operations, including pairing, pairing-based scalar multiplication, bilinear pairing, exponential operations, elliptic curve scalar multiplication, and point multiplication operations. These traditional operands are cost-intensive and require high computing power and bandwidth overload, thus affecting efficiency. Due to the cost-intensive nature and high resource requirements, traditional approaches are not feasible and are unsuitable for resource-limited IoT devices. Furthermore, the lack of essential security attributes in traditional schemes, such as unforgeability, public verifiability, non-repudiation, forward secrecy, and resistance to denial-of-service attacks, puts data security at high risk. To overcome these challenges, we have introduced a novel signcryption algorithm based on hyperelliptic curve divisor multiplication, which is much faster than other traditional mathematical operations. Hence, the proposed methodology is based on a hyperelliptic curve, due to which it has enhanced security with smaller key sizes that reduce computational complexity by 38.16% and communication complexity by 62.5%, providing a well-balanced solution by utilizing few resources while meeting the security and efficiency requirements of resource-constrained devices. The proposed strategy also involves formal security validation, which provides confidence for the proposed methodology in practical implementations.

Funder

Prince Sultan University

Publisher

MDPI AG

Reference66 articles.

1. An overview of IoT architectures, technologies, and existing open-source projects;Campos;Internet Things,2022

2. Internet of things security: Challenges and key issues;Azrour;Secur. Commun. Netw.,2021

3. A comprehensive study of DDoS attacks over IoT network and their countermeasures;Kumari;Comput. Secur.,2023

4. Ansar, S.A., Arya, S., Aggrawal, S., Saxena, S., Kushwaha, A., and Pathak, P.C. (2023). Computer Vision and Robotics: Proceedings of CVR 2022, Springer.

5. Al-Shareeda, M.A., Manickam, S., Laghari, S.A., and Jaisan, A. (2022). Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications. Sustainability, 14.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3