Journal ArticleDOI
Heterogeneous Signcryption With Equality Test for IIoT Environment
TLDR
A heterogeneous signcryption scheme with equality test (HSC-ET) that enables a sensor in public key infrastructure to execute data encryption and deliver it to the semitrusted entity (cloud server) and is demonstrated to be secure by the rigorous and detailed analysis.Abstract:
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things (IIoT). To deal with this challenge, we propose a heterogeneous signcryption scheme with equality test (HSC-ET) in this article. This scheme enables a sensor in public key infrastructure (PKI) to execute data encryption and deliver it to the semitrusted entity (cloud server). When a user in an identity-based cryptosystem (IBC) intends to search for some data stored on the cloud server. The delegated cloud server executes tests on ciphertexts for determining whether the same underlying plaintext exists between two ciphertexts. These two ciphertexts can be one signcrypted ciphertext and one encrypted ciphertext, or both encrypted/signcrypted ciphertext, thus achieving a flexible search to the ciphertext. HSC-ET is demonstrated to be secure by the rigorous and detailed analysis. The experimental simulation and analysis results show the efficiency of our scheme.read more
Citations
More filters
Journal ArticleDOI
A secure blockchain-based group key agreement protocol for IoT
TL;DR: This paper proposes a blockchain-based authenticated group key agreement protocol for IoT, which introduces a new entity called the device manager, who acts as an intermediary to connect IoT devices with blockchain networks.
Journal ArticleDOI
A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings
TL;DR: Li et al. as discussed by the authors proposed a Shamir threshold cryptography scheme for IIoT data protection using blockchain, where the edge gateway uses a symmetric key to encrypt the data uploaded by the IoT device and stores it in the cloud.
Journal ArticleDOI
An enhanced pairing-based authentication scheme for smart grid communications
TL;DR: This study finds that the PAuth scheme proposed by Chen et al. still suffers from some security defects, and an enhanced scheme based on PAuth is proposed, and ProVerif, an automatic cryptographic protocol verifier, is used to analyze the enhanced scheme.
Journal ArticleDOI
Improved ECC-Based Three-Factor Multiserver Authentication Scheme
TL;DR: Wang et al. as mentioned in this paper proposed a multiserver authentication scheme based on biometrics and proved the security of their scheme against session-specific temporary information attacks, user impersonation attacks, and server impersonation attack.
Journal ArticleDOI
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
TL;DR: A new authentication key exchange (AKE) scheme that uses fog nodes as relay nodes has been designed and completes mutual authentication and generates a session key for later confidential communication in fog-based VANETs.
References
More filters
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Internet of Things in Industries: A Survey
Li Da Xu,Wu He,Shancang Li +2 more
TL;DR: This review paper summarizes the current state-of-the-art IoT in industries systematically and identifies research trends and challenges.
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Proceedings ArticleDOI
An overview of the OMNeT++ simulation environment
Andras Varga,Rudolf Hornig +1 more
TL;DR: An overview of the OMNeT++ framework, recent challenges brought about by the growing amount and complexity of third party simulation models, and the solutions the authors introduce in the next major revision of the simulation framework are presented.
Book ChapterDOI
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.