An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System

An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System

V. Vinoth Kumar, V. Muthukumaran, N. Ashwini, I.S. Beschi, K. Gunasekaran, V.R. Niveditha
Copyright: © 2022 |Pages: 31
DOI: 10.4018/IJeC.299011
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Signcryption is a cryptographic primitive which combines both the functions of digital signature and public key encryption logically in a single step, with a computational cost significantly less than the traditional signature-then-encryption approach. Signcryption is another approach to accomplish secrecy and validation simultaneously across Internet of Things (IoT). Numerous signcryption schemes have been created and executed , but it uses different security attributes and computational cost. In this paper, introducing a new signcryption scheme whose security relies on the intractability of combination of the Twisted Root Extraction Problem (TREP) and Conjugacy Search Problem (CSP) which can utilised for IoT based system for secure transferring of data. It is applied over an IoT to upgrade the security of information and its confidentiality. Experiment shows that modified signcryption algorithm outperforms than existing approaches.
Article Preview
Top

1. Introduction

A lot of encryption schemes and digital signature schemes have been proposed to accomplish security with minimal cost and higher effectiveness. The aim of encryption schemes is to give confidentiality and the aim of digital signature schemes is to provide authentication and non-repudiation. In some situations, it is required to achieve confidentiality and authenticity of transmitted data simultaneously while sending it over open communication channel. To achieve both authentication and confidentiality of a message/data, encryption and digital signatures are applied over the message one by one. But this takes more computational time and cost. To resolve this problem (Youliang Zheng, 1997), proposed the idea of signcryption scheme which combines both an encryption and a digital signature scheme in single logical step. The signcryption scheme provides confidentiality and authenticity of data simultaneously with low computational cost and higher efficiency. The security of the signcryption scheme by Youliang Zheng relies on the intractability of the DLP. In the survey, a lot of signcryption schemes have been proposed whose security relies on different trapdoors(F. Amounas et al, 2013). The idea of signcryption scheme is extended to integer factorization problem in the signcryption scheme is presented using elliptic curves and pairings respectively. Since the security of each signcryption scheme proposed relies on the intractability of one of the trapdoors like the DLP, the ECDLP, and the IFP etc. In this paper we propose a signcryption scheme over non commutative algebraic structure using the Twisted Conjugacy Root Extraction Problem (TCREP). The security of the proposed signcryption scheme relies on the intractability of the TCREP. The proposed signcryption scheme is proved to be secure in Random Oracle Model (ROM).

IoT based security is the methodology section consisting of safeguarding associating devices and system IoT. This system involves extra internet linking to the system of interlinked devices, digital devices and mechanical objects or peoples. Every things is given a significant identity and the data transfer ability over a particular system. Devices are allowed to connect to open internet up to various vulnerabilities. Comparing with various kinds of networking, the information centric network needs high security.

Figure 1.

IoT Data Storage Architecture

IJeC.299011.f01

Information Centric Network (ICN) is centred towards the contents that are transmitted across the network between different hosts. ICN is one of the evolving network paradigms that have gained significance with the shift in trend towards cloud computing services and Internet of Things (IoT). ICN is a name centric approach in the sense that the data is segregated and each unit is termed as Named Data Object (NDO). Figure 1 depicts the general data storage architecture, which includes some key elements in the architecture such as end user application which is based on the collected data, cloud server is utilised for saving the data which is gathered from the IoT based sensors which are transmitted through wireless communications.

This work focuses on integrating the benefits of signcryption into Information Centric Network to enhance the confidentiality and integrity of data. The security of NDOs are enhanced by using the method of signcryption and the results are analysed and reported in the following sections. Our objective of the proposed work is summarized as given below:

  • 1.

    We developed an effective signcryption scheme which associates both the activities of public key and digital signature in one step, which makes the functionalities of the signcryption scheme more effective.

  • 2.

    Our scheme acquires minimal cost of computation significantly when compared to that of scheme which is working on the traditional aspects to the encryption approach.

  • 3.

    This methodology proposed provides some numerical encryption which has been incorporated in this IoT based framework that executed up to the point of creation in the communication overhead.

  • 4.

    Overall, the main goal of the efficient scheme of encryption is to provide security up gradation in IoT based scenario and its confidentiality.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing