Abstract
This paper presents a novel secure and privacy-preserving scheme for enhancing the security of transmitted data in an Internet of Things (IoT) environment. The proposed scheme combines a short group signature scheme with a signcryption method to represent an efficient short group signcryption (SGSC) technique with added security features. The proposed scheme supports aggregation and batch verification to eliminate the issue of increasing the computation delay from which the current IoT system suffers, particularly when the number of connected devices are increased. Detailed security analysis has shown that the proposed SGSC scheme is robust against many security and privacy threats in the IoT communication network, and can achieve more security features compared with currently available group signature schemes. The proposed scheme shows high efficiency in terms of computational cost in verifying a large number of messages within a short time frame.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Agrawal H, Dhall R, Iyer K, Chetlapalli V (2019) An improved energy efficient system for iot enabled precision agriculture. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01359-2
Alamer A (2018) A secure and privacy-preserving incentive framework for vehicular cloud. PhD thesis, University of Ontario Institute of Technology (Canada)
Alamer A, Basudan S (2020) An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. Eng Appl Artif Intell 91:103583
Alamer A, Deng Y, Lin X (2017a) A privacy-preserving and truthful tendering framework for vehicle cloud computing. In: Proceeding of the Communications (ICC),IEEE International Conference on pp 1–7
Alamer A, Deng Y, Lin X (2017b) Secure and privacy-preserving task announcement in vehicular cloud. In: Proceeding of the Wireless Communications and Signal Processing (WCSP), 9th International Conference on
Alamer A, Ni J, Lin X, Shen X (2017c) Location privacy-aware task recommendation for spatial crowdsourcing. In: Proceeding of the Wireless Communications and Signal Processing (WCSP), 9th International Conference on
Alamer A, Basudan S, Lin X (2018a) A privacy-preserving incentive framework for the vehicular cloud. In: Proceeding of the IEEE International Conference on Green Computing and Communications pp 435–441
Alamer A, Deng Y, Wei G, Lin X (2018b) Collaborative security in vehicular cloud computing: a game theoretic view. IEEE Netw 32(3):72–77
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Asghari P, Rahmani AM, Javadi HHS (2020) Privacy-aware cloud service composition based on qos optimization in internet of things. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01723-7
Basudan S, Lin X, Sankaranarayanan K (2017a) An efficient compromised node revocation scheme in fog-assisted vehicular crowdsensing. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp 1–6
Basudan S, Lin X, Sankaranarayanan K (2017b) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J 4(3):772–782
Basudan S, Alamer A, Lin X (2018) Efficient deduplicated reporting in fog-assisted vehicular crowdsensing. In: Proceeding of the IEEE International Conference on green computing and communications pp 435–441
Biswas A, Majumdar A, Nath S, Dutta A, Baishnab K (2020) Lrbc: a lightweight block cipher design for resource constrained iot devices. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01694-9
Biswas AR, Giaffreda R (2014) Iot and cloud convergence: opportunities and challenges. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), IEEE, pp 375–376
Boneh D, Shacham H (2004) Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM conference on Computer and communications security, ACM, pp 168–177
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: International Conference on the theory and application of cryptology and information security, Springer, pp 514–532
Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Annual International Cryptology Conference, Springer, pp 41–55
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16
Centenaro M, Vangelista L, Zanella A, Zorzi M (2016) Long-range communications in unlicensed bands: the rising stars in the iot and smart city scenarios. IEEE Wirel Commun 23(5):60–67
Feng W, Yan Z, Xie H (2017) Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access 5:6236–6246
Ferrara AL, Green M, Hohenberger S, Pedersen MØ (2009) Practical short signature batch verification. In: Cryptographers’ Track at the RSA Conference, Springer, pp 309–324
Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on iot. Proc Comput Sci 52:1089–1094
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): A vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660
Härri J, Filali F, Bonnet C, Fiore M (2006) Vanetmobisim: generating realistic mobility patterns for vanets. In: Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp 96–97
Härri J, Filali F, Bonnet C, Fiore M (2007) Mobile network simulation environment. [Online] http://vaneteurecomfr/. Accessed 21 Aug 2020
Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X (2016) Eppd: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC), IEEE, pp 1–6
Hwang YH (2015) Iot security & privacy: threats and challenges. In: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, ACM, pp 1–1
Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121
Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223
Karthika E, Mohanapriya S (2020) Real time behavior based service specific secure routing for cloud centric iot systems. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01879-2
Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology, IEEE, pp 257–260
Kim D, Lee T, Kim S, Lee B, Youn HY (2019) Adaptive packet scheduling in iot environment based on q-learning. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01351-w
Kim HJ, Lim JI, Lee DH (2000) Efficient and secure member deletion in group signature schemes. In: International Conference on information security and cryptology, Springer, pp 150–161
Kim K, Yie I, Lim S, Nyang D (2011) Batch verification and finding invalid signatures in a group signature scheme. IJ Netw Secur 13(2):61–70
Kim RY, Pathuri VSR (2015) Setup of multiple iot devices. US Patent 9,210,192
Kong Q, Lu R, Zhu H, Alamer A, Lin X (2016) A secure and privacy-preserving incentive framework for vehicular cloud on the road. In: 2016 IEEE Global Communications Conference (GLOBECOM), IEEE, pp 1–6
Lee I, Lee K (2015) The internet of things (iot): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440
Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported internet of things environment. In: 2015 6th International Conference on the Network of the Future (NOF), IEEE, pp 1–3
Lemoine F, Aubonnet T, Simoni N (2020) Iot composition based on self-controlled services. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01831-4
Ni J, Zhang K, Lin X, Shen XS (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surveys Tutor 20(1):601–628
ns 3 Team (2019) The network simulator - ns-3. [Online] https://wwwnsnamorg/docs/release/330/models/singlehtml/indexhtml. Accessed 20 Aug 2020
Porambage P, Ylianttila M, Schmitt C, Kumar P, Gurtov A, Vasilakos AV (2016) The quest for privacy in the internet of things. IEEE Cloud Comput 3(2):36–45
Preeth SSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for wsn-assisted iot system. J Ambient Intell Hum Comput pp 1–13
Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58
Roy S, Rawat U, Sareen HA, Nayak SK (2020) Ieca: an efficient iot friendly image encryption technique using programmable cellular automata. J Ambient Intell Hum Comput pp 1–20
Scott M (2005) Computing the tate pairing. In: Cryptographers’ Track at the RSA Conference, Springer, pp 293–304
Scott M (2007) Efficient implementation of cryptographic pairings. [Online] http://www pairing-conference org/2007/invited/Scott slide pdf. Accessed 21 Aug 2020
Seok MG, Park D (2018) A novel multi-level evaluation approach for human-coupled iot applications. J Ambient Intell Human Comput pp 1–14
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0494-4
Szczechowiak P, Oliveira LB, Scott M, Collier M, Dahab R (2008) Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In: European conference on Wireless Sensor Networks, Springer, pp 305–320
Vallati C, Virdis A, Mingozzi E, Stea G (2016) Mobile-edge computing come home connecting things in future smart homes using lte device-to-device communications. IEEE Consum Electron Mag 5(4):77–83
Wang Y, Zhong H, Xu Y, Cui J (2016) Ecpb: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. IJ Netw Secur 18(2):374–382
Weber RH (2010) Internet of things-new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
Xu T, Wendt JB, Potkonjak M (2014) Security of iot systems: Design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM International Conference on computer-aided design, IEEE Press, pp 417–423
Zhang Y, Wang Y (2020) A novel energy-aware bio-inspired clustering scheme for iot communication. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01704-w
Zhang L, Li C, Li Y, Luo Q, Zhu R (2017) Group signature based privacy protection algorithm for mobile ad hoc network. In: 2017 IEEE International Conference on Information and Automation (ICIA), IEEE, pp 947–952
Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security, IEEE, pp 663–667
Zheng Y (1997) Signcryption and its applications in efficient public key solutions. In: International Workshop on Information Security, Springer, pp 291–312
Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based iot: challenges. IEEE Commun Mag 55(1):26–33
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alamer, A. An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things. J Ambient Intell Human Comput 14, 5885–5902 (2023). https://doi.org/10.1007/s12652-020-02076-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02076-x