Hyper elliptic curve based certificateless signcryption scheme for secure IIoT communications

Ali, Usman and Idris, Mohd Yamani Idna and Frnda, Jaroslav and Bin Ayub, Mohamad Nizam and Alroobaea, Roobaea and Almansour, Fahad and Shagari, Nura Modi and Ullah, Insaf and Ali, Ihsan (2022) Hyper elliptic curve based certificateless signcryption scheme for secure IIoT communications. CMC-Computers Materials & Continua, 71 (2). pp. 2515-2532. ISSN 1546-2218, DOI https://doi.org/10.32604/cmc.2022.019800.

Full text not available from this repository.

Abstract

Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unneces-sary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. There-fore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a hyperelliptic curve cryptography (HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with the aim of improving security while lowering computational and communication overhead in IIoT environment. HECC with 80-bit smaller key and parameters sizes offers similar security as elliptic curve cryptography (ECC) with 160-bit long key and parameters sizes. We assessed the IIoT-CS scheme security by applying formal and informal security evaluation techniques. We used Real or Random (RoR) model and the widely used automated validation of inter -net security protocols and applications (AVISPA) simulation tool for formal security analysis and proved that the IIoT-CS scheme provides resistance to various attacks. Our proposed IIoT-CS scheme is relatively less expensive compared to the current state-of-the-art in terms of computational cost and communication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead, respectively, compared to the most recent protocol.

Item Type: Article
Funders: Grant System of University of Zilina [Grant No: 1/2020 7962], Vedecka grantova agentura MSVVaS SR a SAV (VEGA) [Grant No: 1/0157/21], Taif University, Taif, Saudi Arabia [Grant No: TURSP-2020/36]
Uncontrolled Keywords: IoT security; Authentication protocols; Hyperelliptic curve cryptography; Certificateless public key cryptography
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 29 Jul 2022 08:25
Last Modified: 29 Jul 2022 08:25
URI: http://eprints.um.edu.my/id/eprint/33516

Actions (login required)

View Item View Item