Abstract
With the development of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), as an extension of the IoT, has become more and more widely used in the industrial field. It collects various data in the IIoT environment through sensors. For security reasons, these data cannot be presented in plaintext. To ensure the security of these data, a signcryption primitive is presented. In practice, numerous sensors and servers are not in the same environment, so we need a heterogeneous signcryption scheme to solve this problem. In this paper, we introduce a heterogeneous signcryption scheme with the critical characteristic of allowing devices in certificateless cryptography (CLC) environments send messages to devices in identity-based cryptography (IBC) environments. In the random oracle model (ROM), for its security aspects, we present the relevant proofs. We also compared it with other schemes in terms of communication overhead. A comprehensive analysis has shown that our scheme improves efficiency and also increases security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiong, H., Wu, Y., Jin, C., Kumari, S.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 7(12), 11713–11724 (2020)
Wu, Y., Dai, H.N., Wang, H.: Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J. 8(4), 2300–2317 (2020)
Jayaram, A.: Lean six sigma approach for global supply chain management using industry 4.0 and IIoT. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 89–94. IEEE (2016)
Chen, B., Wan, J., Lan, Y., Imran, M., Li, D., Guizani, N.: Improving cognitive ability of edge intelligent IIoT through machine learning. IEEE Netw. 33(5), 61–67 (2019)
Ho, T.M., et al.: Next-generation wireless solutions for the smart factory, smart vehicles, the smart grid and smart cities. arXiv preprint arXiv:1907.10102 (2019)
Yerra, V.A., Pilla, S.: IIoT-enabled production system for composite intensive vehicle manufacturing. SAE Int. J. Engines 10(2), 209–214 (2017)
Zhang, Y., Huang, X.: Security and privacy techniques for the industrial internet of things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 245–268. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12330-7_12
Abomhara, M., Køien, G.M.: Security and privacy in the internet of things: Current status and open issues. In: 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE (2014)
Kaci, A., Bouabana-Tebibel, T., Rachedi, A., Yahiaoui, C.: Toward a big data approach for indexing encrypted data in cloud computing. Secur. Priv. 2(3), e65 (2019)
Kaci, A., Rachedi, A.: Toward a machine learning and software defined network approaches to manage miners’ reputation in blockchain. J. Netw. Syst. Manage. 28(3), 478–501 (2020)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). https://doi.org/10.1007/11767480_20
Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(<<\) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234
Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive (2002)
So, H.K.H., Kwok, S.H., Lam, E.Y., Lui, K.S.: Zero-configuration identity-based signcryption scheme for smart grid. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. IEEE (2010)
Karati, A., Islam, S.H., Biswas, G., Bhuiyan, M.Z.A., Vijayakumar, P., Karuppiah, M.: Provably secure identity-based signcryption scheme for crowdsourced industrial internet of things environments. IEEE Internet Things J. 5(4), 2904–2914 (2017)
Ashibani, Y., Mahmoud, Q.H.: An efficient and secure scheme for smart home communication using identity-based signcryption. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp. 1–7. IEEE (2017)
Li, F., Han, Y., Jin, C.: Cost-effective and anonymous access control for wireless body area networks. IEEE Syst. J. 12(1), 747–758 (2016)
Ullah, S.S., Hussain, S., Alroobaea, R., Ali, I., et al.: Securing NDN-based internet of health things through cost-effective signcryption scheme. Wirel. Commun. Mob. Comput. 2021, 1–13 (2021)
Li, F., Hong, J.: Efficient certificateless access control for wireless body area networks. IEEE Sens. J. 16(13), 5389–5396 (2016)
Nayak, B.: A secure id-based signcryption scheme based on elliptic curve cryptography. Int. J. Comput. Intell. Stud. 6(2–3), 150–156 (2017)
Xu, G., Dong, J., Ma, C., Liu, J., Cliff, U.G.O.: A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet Things J. (2022). https://doi.org/10.1109/JIOT.2022.3151359
Sun, Y., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53(3), 557–566 (2010)
Huang, Q., Wong, D.S., Yang, G.: Heterogeneous signcryption with key privacy. Comput. J. 54(4), 525–536 (2011)
Zhang, Y.L., Zhang, L.G., Zhang, Y.J., Wang, H., Wang, C.F.: CLPKC-to-TPKI heterogeneous signcryption scheme with anonymity. Acta Electon. Sin. 40(10), 2432 (2016)
Wang, C., Liu, C., Niu, S., Chen, L., Wang, X.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)
Niu, S., Li, Z., Wang, C.: Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10603, pp. 216–229. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68542-7_18
Liu, Q., Gong, B., Ning, Z.: Research on CLPKC-IDPKC cross-domain identity authentication for IOT environment. Comput. Commun. 157, 410–416 (2020)
Shijin, L., Tao, F., Ting, S.: Security analysis and improvement of hybrid signcryption scheme based on heterogeneous system. In: 2019 14th International Conference on Computer Science & Education (ICCSE), pp. 840–845. IEEE (2019)
Niu, S., Yang, X., Wang, C., Tian, M., Du, X.: Hybrid group signcryption scheme based on heterogeneous cryptosystem. J. Electron. Inf. Technol. 41(5), 1180–1186 (2019)
Shim, K.A., Lee, Y.R., Park, C.M.: Eibas: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_9
Shim, K.A.: S2drp: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Netw. 19, 1–8 (2014)
Ma, C., Xue, K., Hong, P.: Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7(4), 759–773 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jin, C., Li, C., Qin, W., Chen, X., Chen, G. (2022). A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_1
Download citation
DOI: https://doi.org/10.1007/978-981-19-8445-7_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8444-0
Online ISBN: 978-981-19-8445-7
eBook Packages: Computer ScienceComputer Science (R0)