[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper presents a novel secure and privacy-preserving scheme for enhancing the security of transmitted data in an Internet of Things (IoT) environment. The proposed scheme combines a short group signature scheme with a signcryption method to represent an efficient short group signcryption (SGSC) technique with added security features. The proposed scheme supports aggregation and batch verification to eliminate the issue of increasing the computation delay from which the current IoT system suffers, particularly when the number of connected devices are increased. Detailed security analysis has shown that the proposed SGSC scheme is robust against many security and privacy threats in the IoT communication network, and can achieve more security features compared with currently available group signature schemes. The proposed scheme shows high efficiency in terms of computational cost in verifying a large number of messages within a short time frame.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Agrawal H, Dhall R, Iyer K, Chetlapalli V (2019) An improved energy efficient system for iot enabled precision agriculture. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01359-2

    Article  Google Scholar 

  • Alamer A (2018) A secure and privacy-preserving incentive framework for vehicular cloud. PhD thesis, University of Ontario Institute of Technology (Canada)

  • Alamer A, Basudan S (2020) An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing. Eng Appl Artif Intell 91:103583

    Article  Google Scholar 

  • Alamer A, Deng Y, Lin X (2017a) A privacy-preserving and truthful tendering framework for vehicle cloud computing. In: Proceeding of the Communications (ICC),IEEE International Conference on pp 1–7

  • Alamer A, Deng Y, Lin X (2017b) Secure and privacy-preserving task announcement in vehicular cloud. In: Proceeding of the Wireless Communications and Signal Processing (WCSP), 9th International Conference on

  • Alamer A, Ni J, Lin X, Shen X (2017c) Location privacy-aware task recommendation for spatial crowdsourcing. In: Proceeding of the Wireless Communications and Signal Processing (WCSP), 9th International Conference on

  • Alamer A, Basudan S, Lin X (2018a) A privacy-preserving incentive framework for the vehicular cloud. In: Proceeding of the IEEE International Conference on Green Computing and Communications pp 435–441

  • Alamer A, Deng Y, Wei G, Lin X (2018b) Collaborative security in vehicular cloud computing: a game theoretic view. IEEE Netw 32(3):72–77

    Article  Google Scholar 

  • Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42

    Article  Google Scholar 

  • Asghari P, Rahmani AM, Javadi HHS (2020) Privacy-aware cloud service composition based on qos optimization in internet of things. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01723-7

    Article  Google Scholar 

  • Basudan S, Lin X, Sankaranarayanan K (2017a) An efficient compromised node revocation scheme in fog-assisted vehicular crowdsensing. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp 1–6

  • Basudan S, Lin X, Sankaranarayanan K (2017b) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J 4(3):772–782

    Article  Google Scholar 

  • Basudan S, Alamer A, Lin X (2018) Efficient deduplicated reporting in fog-assisted vehicular crowdsensing. In: Proceeding of the IEEE International Conference on green computing and communications pp 435–441

  • Biswas A, Majumdar A, Nath S, Dutta A, Baishnab K (2020) Lrbc: a lightweight block cipher design for resource constrained iot devices. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01694-9

    Article  Google Scholar 

  • Biswas AR, Giaffreda R (2014) Iot and cloud convergence: opportunities and challenges. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), IEEE, pp 375–376

  • Boneh D, Shacham H (2004) Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM conference on Computer and communications security, ACM, pp 168–177

  • Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: International Conference on the theory and application of cryptology and information security, Springer, pp 514–532

  • Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Annual International Cryptology Conference, Springer, pp 41–55

  • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16

  • Centenaro M, Vangelista L, Zanella A, Zorzi M (2016) Long-range communications in unlicensed bands: the rising stars in the iot and smart city scenarios. IEEE Wirel Commun 23(5):60–67

    Article  Google Scholar 

  • Feng W, Yan Z, Xie H (2017) Anonymous authentication on trust in pervasive social networking based on group signature. IEEE Access 5:6236–6246

    Article  Google Scholar 

  • Ferrara AL, Green M, Hohenberger S, Pedersen MØ (2009) Practical short signature batch verification. In: Cryptographers’ Track at the RSA Conference, Springer, pp 309–324

  • Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on iot. Proc Comput Sci 52:1089–1094

    Article  Google Scholar 

  • Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): A vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  • Härri J, Filali F, Bonnet C, Fiore M (2006) Vanetmobisim: generating realistic mobility patterns for vanets. In: Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp 96–97

  • Härri J, Filali F, Bonnet C, Fiore M (2007) Mobile network simulation environment. [Online] http://vaneteurecomfr/. Accessed 21 Aug 2020

  • Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X (2016) Eppd: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC), IEEE, pp 1–6

  • Hwang YH (2015) Iot security & privacy: threats and challenges. In: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, ACM, pp 1–1

  • Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121

    Article  Google Scholar 

  • Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210–223

    Article  Google Scholar 

  • Karthika E, Mohanapriya S (2020) Real time behavior based service specific secure routing for cloud centric iot systems. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01879-2

    Article  Google Scholar 

  • Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology, IEEE, pp 257–260

  • Kim D, Lee T, Kim S, Lee B, Youn HY (2019) Adaptive packet scheduling in iot environment based on q-learning. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01351-w

    Article  Google Scholar 

  • Kim HJ, Lim JI, Lee DH (2000) Efficient and secure member deletion in group signature schemes. In: International Conference on information security and cryptology, Springer, pp 150–161

  • Kim K, Yie I, Lim S, Nyang D (2011) Batch verification and finding invalid signatures in a group signature scheme. IJ Netw Secur 13(2):61–70

    Google Scholar 

  • Kim RY, Pathuri VSR (2015) Setup of multiple iot devices. US Patent 9,210,192

  • Kong Q, Lu R, Zhu H, Alamer A, Lin X (2016) A secure and privacy-preserving incentive framework for vehicular cloud on the road. In: 2016 IEEE Global Communications Conference (GLOBECOM), IEEE, pp 1–6

  • Lee I, Lee K (2015) The internet of things (iot): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440

    Article  Google Scholar 

  • Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported internet of things environment. In: 2015 6th International Conference on the Network of the Future (NOF), IEEE, pp 1–3

  • Lemoine F, Aubonnet T, Simoni N (2020) Iot composition based on self-controlled services. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01831-4

    Article  Google Scholar 

  • Ni J, Zhang K, Lin X, Shen XS (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surveys Tutor 20(1):601–628

    Article  Google Scholar 

  • ns 3 Team (2019) The network simulator - ns-3. [Online] https://wwwnsnamorg/docs/release/330/models/singlehtml/indexhtml. Accessed 20 Aug 2020

  • Porambage P, Ylianttila M, Schmitt C, Kumar P, Gurtov A, Vasilakos AV (2016) The quest for privacy in the internet of things. IEEE Cloud Comput 3(2):36–45

    Article  Google Scholar 

  • Preeth SSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for wsn-assisted iot system. J Ambient Intell Hum Comput pp 1–13

  • Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58

    Article  Google Scholar 

  • Roy S, Rawat U, Sareen HA, Nayak SK (2020) Ieca: an efficient iot friendly image encryption technique using programmable cellular automata. J Ambient Intell Hum Comput pp 1–20

  • Scott M (2005) Computing the tate pairing. In: Cryptographers’ Track at the RSA Conference, Springer, pp 293–304

  • Scott M (2007) Efficient implementation of cryptographic pairings. [Online] http://www pairing-conference org/2007/invited/Scott slide pdf. Accessed 21 Aug 2020

  • Seok MG, Park D (2018) A novel multi-level evaluation approach for human-coupled iot applications. J Ambient Intell Human Comput pp 1–14

  • Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  • Szczechowiak P, Oliveira LB, Scott M, Collier M, Dahab R (2008) Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In: European conference on Wireless Sensor Networks, Springer, pp 305–320

  • Vallati C, Virdis A, Mingozzi E, Stea G (2016) Mobile-edge computing come home connecting things in future smart homes using lte device-to-device communications. IEEE Consum Electron Mag 5(4):77–83

    Article  Google Scholar 

  • Wang Y, Zhong H, Xu Y, Cui J (2016) Ecpb: efficient conditional privacy-preserving authentication scheme supporting batch verification for vanets. IJ Netw Secur 18(2):374–382

    Google Scholar 

  • Weber RH (2010) Internet of things-new security and privacy challenges. Comput Law Secur Rev 26(1):23–30

    Article  Google Scholar 

  • Xu T, Wendt JB, Potkonjak M (2014) Security of iot systems: Design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM International Conference on computer-aided design, IEEE Press, pp 417–423

  • Zhang Y, Wang Y (2020) A novel energy-aware bio-inspired clustering scheme for iot communication. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01704-w

    Article  Google Scholar 

  • Zhang L, Li C, Li Y, Luo Q, Zhu R (2017) Group signature based privacy protection algorithm for mobile ad hoc network. In: 2017 IEEE International Conference on Information and Automation (ICIA), IEEE, pp 947–952

  • Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security, IEEE, pp 663–667

  • Zheng Y (1997) Signcryption and its applications in efficient public key solutions. In: International Workshop on Information Security, Springer, pp 291–312

  • Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based iot: challenges. IEEE Commun Mag 55(1):26–33

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrahman Alamer.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alamer, A. An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things. J Ambient Intell Human Comput 14, 5885–5902 (2023). https://doi.org/10.1007/s12652-020-02076-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02076-x

Keywords

Navigation