scholarly journals A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 98910-98928 ◽  
Author(s):  
Syed Sajid Ullah ◽  
Insaf Ullah ◽  
Hizbullah Khattak ◽  
Muhammad Asghar Khan ◽  
Muhammad Adnan ◽  
...  
2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Manazara Rehman ◽  
Hizbullah Khattak ◽  
Ahmed Saeed Alzahrani ◽  
Insaf Ullah ◽  
Muhammad Adnan ◽  
...  

Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). This paper presents a new concept of CLC to IBC heterogeneous generalized signcryption for the first time to fulfil the prime security requirements of NDN-based IoT. The proposed scheme provides the security properties according to situational needs without disturbing the structural policy of NDN. Considering the resource-constrained nature of IoT, we used a lightweight type of elliptic curve called the hyperelliptic curve cryptosystem which offers the same level of security as that of bilinear pairing and an elliptic curve cryptosystem using a minimum key size. Further, we compare the proposed scheme with recently proposed identity-based as well as certificateless generalized signcryption schemes, and the results give satisfactory outputs in terms of computational and communication resources. Furthermore, we simulate the proposed scheme with Automated Validation of Internet Security Protocols and Applications (AVISPA), and the results show that our scheme is valid and safe. Additionally, we provide a practical scenario of the proposed on NDN with an IoT-based smart city.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 40198-40215 ◽  
Author(s):  
Saddam Hussain ◽  
Syed Sajid Ullah ◽  
Abdu Gumaei ◽  
Mabrook Al-Rakhami ◽  
Ijaz Ahmad ◽  
...  

2022 ◽  
pp. 1-26
Author(s):  
Hengshuo Liang ◽  
Lauren Burgess ◽  
Weixian Liao ◽  
Chao Lu ◽  
Wei Yu

The advance of internet of things (IoT) techniques enables a variety of smart-world systems in energy, transportation, home, and city infrastructure, among others. To provide cost-effective data-oriented service, internet of things search engines (IoTSE) have received growing attention as a platform to support efficient data analytics. There are a number of challenges in designing efficient and intelligent IoTSE. In this chapter, the authors focus on the efficiency issue of IoTSE and design the named data networking (NDN)-based approach for IoTSE. To be specific, they first design a simple simulation environment to compare the IP-based network's performance against named data networking (NDN). They then create four scenarios tailored to study the approach's resilience to address network issues and scalability with the growing number of queries in IoTSE. They implement the four scenarios using ns-3 and carry out extensive performance evaluation to determine the efficacy of the approach concerning network resilience and scalability. They also discuss some remaining issues that need further research.


2020 ◽  
Vol 24 (1) ◽  
pp. 14-24 ◽  
Author(s):  
Boubakr Nour ◽  
Hatem Ibn-Khedher ◽  
Hassine Moungla ◽  
Hossam Afifi ◽  
Fan Li ◽  
...  

2018 ◽  
Vol 61 (10) ◽  
pp. 1496-1511 ◽  
Author(s):  
Maroua Meddeb ◽  
Amine Dhraief ◽  
Abdelfettah Belghith ◽  
Thierry Monteil ◽  
Khalil Drira ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document