Comments on “Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices”

2020 ◽  
Vol 7 (5) ◽  
pp. 4666-4670 ◽  
Author(s):  
Bo Zhang
2019 ◽  
Vol 15 (1) ◽  
pp. 155014771882446 ◽  
Author(s):  
Caixue Zhou

The mobile-health system, also known as the wireless body area network for remote patient monitoring, is a system used to remotely monitor the human body’s health status parameters in real time. The generalized signcryption can realize encryption, signature, and signcryption with only one key pair and one algorithm. To address the communication security requirement for the mobile-health system, Zhang et al. recently proposed a lightweight secure data transmission protocol for the mobile-health system, which uses a certificateless generalized signcryption scheme. However, Zhang et al.’s certificateless generalized signcryption scheme is insecure. In this article, we propose an improved certificateless generalized signcryption scheme and then give a rigorous security proof of it. The confidentiality of our improved scheme can be reduced to the computational Diffie–Hellman problem, and the unforgeability, the Elliptic Curve Discrete Logarithm problem. Performance evaluation shows that our scheme has only slightly increased computational and communicational costs compared with the original scheme, but it is more efficient than other certificateless generalized signcryption schemes existing at present. What is more, it is also an efficient scheme compared with those ones protecting the mobile-health system. Based on our scheme, the same lightweight secure data transmission protocol for the mobile-health system can also be constructed, just like the one based on the original scheme.


The IOT is booming in this era, to make user convenience much better than before. The IOT devices involved for communication can be vulnerable by the intruder. During data transmission for the IOT devices, it must be authenticated with suitable methodology. The hackers spoof the address and pretend to be the actual communicator. The other party trust this spoofed address is the authorized person. Hence, this can be processed with the appropriate Cryptography algorithms. The proposed approach is the fusion of AES and ECDSA with implementation of Python code in Ubuntu Linux. The established code takes the Network Address (MAC – Media Access Control) of running host directly through OS, such that the Network address is encrypted. The verification of the Network address is demonstrated with Windows and Ubuntu Virtual Machine. Therefore, the developed code must be installed in IOT device to accomplish secure data transmission. The motto of this paper is to enlighten the security for Network address of IOT devices.


Sign in / Sign up

Export Citation Format

Share Document