scispace - formally typeset
Open AccessJournal ArticleDOI

IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks

Reads0
Chats0
TLDR
In this paper, the authors proposed a lightweight, provably secure identity-based online/offline signature technique (IBOOST) and its extension for massive devices in 5G-WSNs using fractional chaotic maps.
Abstract
The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats to sensitive user information. User authentication and key agreement have been provided for secure end-to-end communication. However, stricter security techniques are required as billions of massive devices are being networked to collect and process complex user data in real-time. Therefore, anonymous authentication and authorization are highly coveted for privacy preservation and prevention of unlawful exploitation of user data. However, guaranteeing data integrity, authentication, and non-repudiation require special-purpose identity-based signature techniques that are quite difficult to design in practice. In order to address this problem, this paper proposes a lightweight, provably secure identity-based online/offline signature technique (IBOOST) and its extension for massive devices in 5G-WSNs using fractional chaotic maps. The IBOOST scheme achieves multi-time use of offline storage at a lower processing time. Therefore, the signer can reuse the offline pre-stored information in a polynomial time. This makes our IBOOST superior to the existing online/offline signature techniques that allow only a single signature. Additionally, the new technique enables the pre-registration process with a secret key, and no secret key is required in the offline stage. Also, the proposed IBOOST proves to be secure in the random oracle unforgeability under the chosen message attack (UF-IBS-CMA). Finally, the IBOOST and its enhanced version (A-IBOOST) give the lowest computational costs compared to several contending techniques. Therefore, the proposed IBOOST shows superior security and performance with better computational overhead than the preliminary techniques.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks

TL;DR: In this paper , a blockchained Beyond Fifth Generation (B5G) enabled malicious node detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure service provisioning scheme using cascading encryption and feature evaluation process is also proposed for IoSTs.
Journal ArticleDOI

Hybrid cluster made content forwarding and light weight sign encryption IoT based named data network using African buffalo optimization algorithm

TL;DR: This work proposes an IoT enabled hybrid cluster-based routing protocol with mitigation of content poisoning attack for information-centric Wireless Sensor Network (WSN)-NDN and is developed by using Hyperelliptic Curve Cryptography to mitigate content poisoning.
Journal ArticleDOI

Trust Based Anonymous Intrusion Detection for Cloud Assisted WSN-IOT

TL;DR: In this paper , the Trusted Anonymous Lightweight Attacker Detection (TALAD) scheme is presented to identify and isolate hostile sensor nodes in a cloud-assisted WSN-IoT system.
Proceedings ArticleDOI

Spectral Efficiency Bounds of Cell-Free Massive MIMO Assisted UAV Cellular Communication

TL;DR: In this paper , the authors derived new expressions for the achievable lower and upper SE bounds for uplink (UL) and downlink (DL) data transmission phases for cell-free assisted UAV communication.
Journal ArticleDOI

Performance Analysis of Vilnius Chaos Oscillator-Based Digital Data Transmission Systems for IoT

TL;DR: In this paper , a comparative performance analysis of two chaos data transmission systems: frequency-modulated chaos shift keying (FM-CSK) and quadrature chaos phase-shift keying(QCPSK) is presented.
References
More filters
Journal ArticleDOI

Next Generation 5G Wireless Networks: A Comprehensive Survey

TL;DR: This survey makes an exhaustive review of wireless evolution toward 5G networks, including the new architectural changes associated with the radio access network (RAN) design, including air interfaces, smart antennas, cloud and heterogeneous RAN, and underlying novel mm-wave physical layer technologies.
Proceedings ArticleDOI

Adaptive protocols for information dissemination in wireless sensor networks

TL;DR: It is found that the SPIN protocols can deliver 60% more data for a given amount of energy than conventional approaches, and that, in terms of dissemination rate and energy usage, the SPlN protocols perform close to the theoretical optimum.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI

A Survey of 5G Network: Architecture and Emerging Technologies

TL;DR: A general probable 5G cellular network architecture is proposed, which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of 5G Cellular network architecture.
Journal Article

Efficient identity based signature schemes based on pairings

TL;DR: In this paper, an efficient identity based signature scheme based on pairings whose security relies on the hardness of the Diffie-Hellman problem in the random oracle model was proposed.
Related Papers (5)