A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

Abstract Recently, the Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. IIoT has essentially become a prime security focus for implementing secure communication. Among the available cryptographic tools, identity-based signcryption provide a sound solution to fulfill the security requirement of IIoT. On the other hand a generalized proxy signcryption can work adaptively as proxy signature and proxy signcryption using a single algorithm. In order to accomplish effective and on-time communication whenever the manager of the company went out for a usual business trip or an IIoT device which has lack of resources, then it must need to delegate her/his signcryption rights to their subordinates (proxy agents/device). For this purpose, to make the delegation procedure more efficient and reliable, we proposed a lightweight identity-based generalized proxy signcryption (IBGPS) scheme for IIoT. The IBGPS scheme is provably secure in terms of indistinguishability against adaptive chosen ciphertext attack (IND − IBGPS − CCA) and existential unforgeable against a possible adaptive chosen message attack (EUF − IBGPS − CMA) under Hyperelliptic Curve Decisional Diffie-Hellman problem (HEDHP) and Hyperelliptic Curve Discrete Logarithm problem (HECDLP) in the random oracle model. Furthermore the performance evaluation in terms of computation and communication costs shows that the IBGPS scheme is more effective than the existing schemes.

[1]  Hizbullah Khattak,et al.  An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things , 2019, Electronics.

[2]  Christof Paar,et al.  Elliptic and hyperelliptic curves on embedded μP , 2004, TECS.

[3]  Guang Gong,et al.  Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields , 2007, IET Inf. Secur..

[4]  Hassan M. Elkamchouchi,et al.  An Efficient ID-based Proxy Signcryption Scheme without Bilinear Pairings , 2013 .

[5]  Michael Huth,et al.  New Developments in Cyber Physical Systems, the Internet of Things and the Digital Economy – Discussion on Future Developments in the Industrial Internet of Things and Industry 4.0 , 2019 .

[6]  Meng Wang,et al.  Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.

[7]  Huaqun Guo,et al.  A Survey on IIoT Security , 2019, 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS).

[8]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[9]  Christof Paar,et al.  Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems , 2005, IEEE Transactions on Computers.

[10]  Zhenfu Cao,et al.  Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings , 2005, CIS.

[11]  Saru Kumari,et al.  A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid , 2020, IEEE Access.

[12]  Juergen Jasperneite,et al.  The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.

[13]  An Braeken,et al.  PUF Based Authentication Protocol for IoT , 2018, Symmetry.

[14]  Ijaz Mansoor Qureshi,et al.  An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network , 2020, IEEE Access.

[15]  Chien-Ming Chen,et al.  Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.

[16]  Kefei Chen,et al.  Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[17]  Xiu-Xia Tian,et al.  Secure ID-Based Proxy Signcryption Scheme with Designated Proxy Signcrypter , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[19]  Jian Wu Identity-Based Proxy Signcryption Schemes , 2013 .

[20]  Hizbullah Khattak,et al.  A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things , 2020, IEEE Access.

[21]  Chunhua Jin,et al.  Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.

[22]  Jianying Zhou,et al.  Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.

[23]  Arun Kumar Sangaiah,et al.  Secure CLS and CL-AS schemes designed for VANETs , 2019, The Journal of Supercomputing.

[24]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[25]  Sherali Zeadally,et al.  Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.

[26]  Kim-Kwang Raymond Choo,et al.  Design of a provably secure biometrics-based multi-cloud-server authentication scheme , 2017, Future Gener. Comput. Syst..

[27]  Hizbullah Khattak,et al.  A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications , 2019, Symmetry.

[28]  Nistala V. E. S. Murthy,et al.  Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks , 2018, Int. J. Commun. Syst..

[29]  Muhammad Rashid Naeem,et al.  A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve , 2018 .

[30]  Lida Xu,et al.  Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..

[31]  Jianmin Li,et al.  Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.

[32]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[33]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[34]  Jia-Lun Tsai,et al.  A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings , 2014, J. Appl. Math..

[35]  Lunzhi Deng,et al.  An Identity Based Proxy Signcryption Scheme without Pairings , 2020, Int. J. Netw. Secur..

[36]  Junaid Ali Khan,et al.  A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach , 2019, Mathematics.

[37]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[38]  Mohammad S. Obaidat,et al.  An efficient and provable certificate-based proxy signature scheme for IIoT environment , 2020, Inf. Sci..

[39]  Hassan M. Elkamchouchi,et al.  A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights , 2008, IACR Cryptol. ePrint Arch..

[40]  Ijaz Mansoor Qureshi,et al.  An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing , 2019, Electronics.

[41]  Xiaoyuan Yang,et al.  ECGSC: Elliptic Curve Based Generalized Signcryption , 2006, UIC.

[42]  Jie Zhang,et al.  Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain , 2018, Int. J. Distributed Sens. Networks.

[43]  Han-Yu Lin,et al.  Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..

[44]  Caixue Zhou,et al.  Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings , 2017, Secur. Commun. Networks.

[45]  Yue Zhang,et al.  A Provable Secure Identity-based Generalized Proxy Signcryption Scheme , 2018, Int. J. Netw. Secur..

[46]  Hu Xiong,et al.  A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing , 2020, KSII Trans. Internet Inf. Syst..

[47]  Prem Prakash Jayaraman,et al.  The Role of Big Data Analytics in Industrial Internet of Things , 2019, Future Gener. Comput. Syst..

[48]  Tiago M. Fernández-Caramés,et al.  A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices , 2018, Sensors.

[49]  Christof Paar,et al.  Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves , 2003, CHES.

[50]  Ercan Öztemel,et al.  Literature review of Industry 4.0 and related technologies , 2018, J. Intell. Manuf..

[51]  Wei-Bin Lee,et al.  Security enhancement of a novel proxy key generation protocol , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[52]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[53]  P. Vasudeva Reddy,et al.  An Efficient ID-Based Proxy Signcryption Scheme , 2012 .

[54]  Arun Kumar Sangaiah,et al.  A certificateless aggregate signature scheme for healthcare wireless sensor network , 2017, Sustain. Comput. Informatics Syst..