Skip to main content

A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1726))

Included in the following conference series:

  • 474 Accesses

Abstract

With the development of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), as an extension of the IoT, has become more and more widely used in the industrial field. It collects various data in the IIoT environment through sensors. For security reasons, these data cannot be presented in plaintext. To ensure the security of these data, a signcryption primitive is presented. In practice, numerous sensors and servers are not in the same environment, so we need a heterogeneous signcryption scheme to solve this problem. In this paper, we introduce a heterogeneous signcryption scheme with the critical characteristic of allowing devices in certificateless cryptography (CLC) environments send messages to devices in identity-based cryptography (IBC) environments. In the random oracle model (ROM), for its security aspects, we present the relevant proofs. We also compared it with other schemes in terms of communication overhead. A comprehensive analysis has shown that our scheme improves efficiency and also increases security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiong, H., Wu, Y., Jin, C., Kumari, S.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 7(12), 11713–11724 (2020)

    Article  Google Scholar 

  2. Wu, Y., Dai, H.N., Wang, H.: Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J. 8(4), 2300–2317 (2020)

    Article  Google Scholar 

  3. Jayaram, A.: Lean six sigma approach for global supply chain management using industry 4.0 and IIoT. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 89–94. IEEE (2016)

    Google Scholar 

  4. Chen, B., Wan, J., Lan, Y., Imran, M., Li, D., Guizani, N.: Improving cognitive ability of edge intelligent IIoT through machine learning. IEEE Netw. 33(5), 61–67 (2019)

    Article  Google Scholar 

  5. Ho, T.M., et al.: Next-generation wireless solutions for the smart factory, smart vehicles, the smart grid and smart cities. arXiv preprint arXiv:1907.10102 (2019)

  6. Yerra, V.A., Pilla, S.: IIoT-enabled production system for composite intensive vehicle manufacturing. SAE Int. J. Engines 10(2), 209–214 (2017)

    Article  Google Scholar 

  7. Zhang, Y., Huang, X.: Security and privacy techniques for the industrial internet of things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 245–268. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12330-7_12

    Chapter  Google Scholar 

  8. Abomhara, M., Køien, G.M.: Security and privacy in the internet of things: Current status and open issues. In: 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8. IEEE (2014)

    Google Scholar 

  9. Kaci, A., Bouabana-Tebibel, T., Rachedi, A., Yahiaoui, C.: Toward a big data approach for indexing encrypted data in cloud computing. Secur. Priv. 2(3), e65 (2019)

    Article  Google Scholar 

  10. Kaci, A., Rachedi, A.: Toward a machine learning and software defined network approaches to manage miners’ reputation in blockchain. J. Netw. Syst. Manage. 28(3), 478–501 (2020)

    Article  Google Scholar 

  11. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  12. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  13. Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). https://doi.org/10.1007/11767480_20

    Chapter  Google Scholar 

  14. Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(<<\) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234

    Chapter  Google Scholar 

  15. Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive (2002)

    Google Scholar 

  16. So, H.K.H., Kwok, S.H., Lam, E.Y., Lui, K.S.: Zero-configuration identity-based signcryption scheme for smart grid. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 321–326. IEEE (2010)

    Google Scholar 

  17. Karati, A., Islam, S.H., Biswas, G., Bhuiyan, M.Z.A., Vijayakumar, P., Karuppiah, M.: Provably secure identity-based signcryption scheme for crowdsourced industrial internet of things environments. IEEE Internet Things J. 5(4), 2904–2914 (2017)

    Article  Google Scholar 

  18. Ashibani, Y., Mahmoud, Q.H.: An efficient and secure scheme for smart home communication using identity-based signcryption. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp. 1–7. IEEE (2017)

    Google Scholar 

  19. Li, F., Han, Y., Jin, C.: Cost-effective and anonymous access control for wireless body area networks. IEEE Syst. J. 12(1), 747–758 (2016)

    Article  Google Scholar 

  20. Ullah, S.S., Hussain, S., Alroobaea, R., Ali, I., et al.: Securing NDN-based internet of health things through cost-effective signcryption scheme. Wirel. Commun. Mob. Comput. 2021, 1–13 (2021)

    Article  Google Scholar 

  21. Li, F., Hong, J.: Efficient certificateless access control for wireless body area networks. IEEE Sens. J. 16(13), 5389–5396 (2016)

    Article  Google Scholar 

  22. Nayak, B.: A secure id-based signcryption scheme based on elliptic curve cryptography. Int. J. Comput. Intell. Stud. 6(2–3), 150–156 (2017)

    Google Scholar 

  23. Xu, G., Dong, J., Ma, C., Liu, J., Cliff, U.G.O.: A certificateless signcryption mechanism based on blockchain for edge computing. IEEE Internet Things J. (2022). https://doi.org/10.1109/JIOT.2022.3151359

  24. Sun, Y., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53(3), 557–566 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  25. Huang, Q., Wong, D.S., Yang, G.: Heterogeneous signcryption with key privacy. Comput. J. 54(4), 525–536 (2011)

    Article  Google Scholar 

  26. Zhang, Y.L., Zhang, L.G., Zhang, Y.J., Wang, H., Wang, C.F.: CLPKC-to-TPKI heterogeneous signcryption scheme with anonymity. Acta Electon. Sin. 40(10), 2432 (2016)

    Google Scholar 

  27. Wang, C., Liu, C., Niu, S., Chen, L., Wang, X.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)

    Google Scholar 

  28. Niu, S., Li, Z., Wang, C.: Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10603, pp. 216–229. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68542-7_18

    Chapter  Google Scholar 

  29. Liu, Q., Gong, B., Ning, Z.: Research on CLPKC-IDPKC cross-domain identity authentication for IOT environment. Comput. Commun. 157, 410–416 (2020)

    Article  Google Scholar 

  30. Shijin, L., Tao, F., Ting, S.: Security analysis and improvement of hybrid signcryption scheme based on heterogeneous system. In: 2019 14th International Conference on Computer Science & Education (ICCSE), pp. 840–845. IEEE (2019)

    Google Scholar 

  31. Niu, S., Yang, X., Wang, C., Tian, M., Du, X.: Hybrid group signcryption scheme based on heterogeneous cryptosystem. J. Electron. Inf. Technol. 41(5), 1180–1186 (2019)

    Google Scholar 

  32. Shim, K.A., Lee, Y.R., Park, C.M.: Eibas: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)

    Article  Google Scholar 

  33. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_9

    Chapter  MATH  Google Scholar 

  34. Shim, K.A.: S2drp: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Netw. 19, 1–8 (2014)

    Article  Google Scholar 

  35. Ma, C., Xue, K., Hong, P.: Distributed access control with adaptive privacy preserving property for wireless sensor networks. Secur. Commun. Netw. 7(4), 759–773 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Jin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jin, C., Li, C., Qin, W., Chen, X., Chen, G. (2022). A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8445-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8444-0

  • Online ISBN: 978-981-19-8445-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics