skip to main content
research-article

Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions

Authors Info & Claims
Published:14 November 2022Publication History
Skip Abstract Section

Abstract

Internet of Things (IoT) techniques have been employed in many areas, e.g., vehicles, smart home, and medicine. Among the applications of IoTs, the Internet of Vehicles (IoV) is one of the most popular techniques. IoVs are protected by public key cryptographic systems, such as RSA and ECC. However, such systems are vulnerable to quantum computer attacks. Thus, we improve the security of IoV-based post-quantum signatures, which can resist quantum computer attacks. The key operations are divisions in a finite field. Hence, we improve the security of IoV-based post-quantum signatures with division by employing systolic architectures. We propose a systolic architecture for computing division in composite fields. After that, we improve the IoT security-based post-quantum signatures with systolic divisions. We test and verify our design on a Field-Programmable Gate Array (FPGA); the experimental results confirm our estimates. Furthermore, the optimized method proposed can be further applied to various applications like solving system of linear equations and cryptographic applications for IoT security.

REFERENCES

  1. [1] Aldossari Mobark Q. and Sidorova Anna. 2018. Consumer acceptance of Internet of Things (IoT): Smart home context. Journal of Computer Information Systems 36 (2018), 111.Google ScholarGoogle Scholar
  2. [2] Ambrosin Moreno, Anzanpour Arman, Conti Mauro, Dargahi Tooska, Moosavi Sanaz Rahimi, Rahmani Amir M., and Liljeberg Pasi. 2018. On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36, 6 (2018), 2535.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Ashraf Butt Talal, Razi Iqbal, Chhattan Shah Sayed, and Tariq Umar. 2018. Social Internet of Vehicles: Architecture and enabling technologies. Computers & Electrical Engineering 69 (2018), 6884.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Buchmann Johannes, Lindner Richard, Rueckert Markus, and Schneider Michael. 2009. Post-quantum cryptography: Lattice signatures. Computing 85, 1–2 (2009), 105125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Butin Denis. 2017. Hash-based signatures: State of play. IEEE Security & Privacy 15, 4 (2017), 3743.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Daneshbeh A. K. and Hasan M. A.. 2005. A class of unidirectional bit serial systolic architectures for multiplicative inversion and division over GF(2m). IEEE Transactions on Computers 54, 3 (March 2005), 370380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Ding Jintai and Petzoldt Albrecht. 2017. Current state of multivariate cryptography. IEEE Security & Privacy 15, 4 (2017), 2836.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Horng Yuh-Tsuen and Wei Shyue-Win. 1994. Fast inverters and dividers for finite field GF(2m). In 1994 IEEE Asia-Pacific Conference on Circuits and Systems, 1994 (APCCAS’94).206 –211. Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Hu Chien Hsing, Wu Chien Ming, Shieh Ming Der, and Hwang Yin Tsung. 2000. Novel iterative division algorithm over GF(2m) and its semi-systolic VLSI realization. In Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems, 2000, Vol. 1. 280283. Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Islam Saif Ul, Khattak Hasan Ali, Pierson Jean-Marc, Din Ikram Ud, Almogren Ahmad, Guizani Mohsen, and Zuair Mansour. 2019. Leveraging utilization as performance metric for CDN enabled energy efficient internet of things. Measurement 147 (2019), 106814. Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Kai Fan, Wei Jiang, Hui Li, and Yang Yintang. 2018. Lightweight RFID protocol for medical privacy protection in IoT. IEEE Transactions on Industrial Informatics 14, 4 (2018), 16561665.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Kang Minhee, Park Eunkyoung, Cho Baek Hwan, and Lee Kyu Sung. 2018. Recent patient health monitoring platforms incorporating Internet of Things-enabled smart devices. International Neurourology Journal 22, Suppl 2 (2018), S76–82.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Lee Ying Tsung, Hsiao Wei Hsuan, Lin Yan Shao, and Chou Seng Cho T.. 2017. Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Transactions on Consumer Electronics 63, 2 (2017), 200207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Li Yanhong, Luo Changyin, Zhu Rongbo, Chen Yuanfang, and Zeng Huacheng. 2017. Efficient spatial keyword query processing in the internet of industrial vehicles. Mobile Networks & Applications 23, 6 (2017), 115.Google ScholarGoogle Scholar
  15. [15] Mao Yijun, Jin Li, Chen Min Rong, Liu Jianan, and Zhan Yiju. 2015. Fully secure fuzzy identity-based encryption for secure IoT communications. Computer Standards & Interfaces 44 (2015), 1–18.Google ScholarGoogle Scholar
  16. [16] Mouapi Alex, Mrad Hatem, and Parsad Asvin. 2020. Implementation of a reliability test protocol for a multimeasurement sensor dedicated to industrial applications of the internet of things. Measurement 152 (2020), 107312. Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Mozaffari Mohammad, Saad Walid, Bennis Mehdi, and Debbah Merouane. 2017. Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications. IEEE Transactions on Wireless Communications 16, 11 (2017), 75747589.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Ok Seung Ho, Shim Jae Hoon, and Moon Byungin. 2017. Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors. Journal of Supercomputing 74, 2 (2017), 126.Google ScholarGoogle Scholar
  19. [19] Sangeetha A. Lakshmi, Bharathi N., Ganesh A. Balaji, and Radhakrishnan T. K.. 2018. Particle swarm optimization tuned cascade control system in an internet of things (IoT) environment. Measurement 117 (2018), 8089. Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Sendrier Nicolas. 2017. Code-based cryptography: State of the art and perspectives. IEEE Security & Privacy 15, 4 (2017), 4450.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Stojkoska Biljana L. Risteska and Trivodaliev Kire V.. 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140 (2017), 14541464.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Umana Valerie Gauthier, Knudsen Lars Ramkilde, and Leander Gregor. 2017. Post-quantum cryptography. Nature 549, 7671 (2017), 188.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Wang Chin-Liang and Lin Jung-Lung. 1993. A systolic architecture for computing inverses and divisions in finite fields GF(2m). IEEE Transactions on Computers 42, 9 (Sep. 1993), 11411146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Wang Jingjing, Jiang Chunxiao, Zhu Han, Yong Ren, and Hanzo Lajos. 2018. Internet of Vehicles: Sensing-aided transportation information collection and diffusion. IEEE Transactions on Vehicular Technology 67, 5 (2018), 38133825.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Wang Xiaojie, Ning Zhaolong, and Wang Lei. 2018. Offloading in Internet of Vehicles: A fog-enabled real-time traffic management system. IEEE Transactions on Industrial Informatics 14, 10 (2018), 45684578.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Wolkerstorfer J., Oswald E., and Lamberger M.. 2002. An ASIC implementation of the AES SBoxes. In Topics in Cryptology-CT-RSA 2002. 2952.Google ScholarGoogle Scholar
  27. [27] Wu Chien-Hsing, Wu Chien-Ming, Shieh Ming-Der, and Hwang Yin-Tsung. 2004. High-speed, low-complexity systolic designs of novel iterative division algorithms in GF(2m). IEEE Transactions on Computers 53, 3 (March 2004), 375380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Xu Jiangtao, Tao Fengbo, Liu Yang, Hu Chengbo, Xu Yang, Keivanimehr Farhad, and Nabipour Narjes. 2020. Data transmission method for sensor devices in Internet of Things based on multivariate analysis. Measurement (2020), 107536. Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Yan Z. and Sarwate D. V.. 2003. New systolic architectures for inversion and division in GF(2m). IEEE Transactions on Computers 52, 11 (Nov. 2003), 15141519. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Yang Yang, Liu Ximeng, and Deng Robert H.. 2017. Lightweight break-glass access control system for healthcare Internet-of-Things. IEEE Transactions on Industrial Informatics PP, 99 (2017), 11.Google ScholarGoogle Scholar
  31. [31] Younan Mina, Houssein Essam H., Elhoseny Mohamed, and Ali Abdelmgeid A.. 2020. Challenges and recommended technologies for the industrial Internet of Things: A comprehensive review. Measurement 151 (2020), 107198. Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Zhang Jiliang and Qu Gang. 2019. Physical unclonable function-based key sharing via machine leaning for IoT security. IEEE Transactions on Industrial Electronics PP, 99 (2019), 11.Google ScholarGoogle Scholar
  33. [33] Zhang Yinghui, Deng Robert, Zheng Dong, Li Jin, Wu Pengfei, and Cao Jin. 2019. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Transactions on Industrial Informatics 15 (2019), 5099–5108.Google ScholarGoogle Scholar
  34. [34] Zhou Jun, Cao Zhenfu, Dong Xiaolei, and Vasilakos Athanasios V.. 2017. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine 55, 1 (2017), 2633.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 22, Issue 4
        November 2022
        642 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3561988
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 November 2022
        • Online AM: 3 February 2022
        • Accepted: 10 July 2020
        • Revised: 24 June 2020
        • Received: 30 April 2020
        Published in toit Volume 22, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format