scholarly journals Efficient Digital Signature Scheme for Internet of Things

Author(s):  
V. Muthukumaran Et al.

Apparently enthusiasm for the Internet of things (IoT) has as of late arrived at its top, with a lot of center from both the private and public parts. IoT, an innovation that empowers the trading of information through linkage among all items encompassing the client, can make new administrations. Information correspondence among objects isn't restricted to individual data, yet can likewise convey diverse information types, for example, detecting data gathered from the general condition. At the point when such information is gathered and utilized malevolently by an assailant, it is more defenseless against dangers than in traditional organization situations. In this article we proposed for digital signature scheme for Internet of Things.

Sensors ◽  
2017 ◽  
Vol 17 (5) ◽  
pp. 1001 ◽  
Author(s):  
Kuo-Hui Yeh ◽  
Chunhua Su ◽  
Kim-Kwang Raymond Choo ◽  
Wayne Chiu

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4239 ◽  
Author(s):  
Shu ◽  
Chen ◽  
Xie ◽  
Sun ◽  
Qi ◽  
...  

With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications. In order to solve the issues of bandwidth limitation and computational efficiency of secure communication in IoT applications, an aggregate signature scheme based on multi- trapdoor hash function is proposed in this paper. Firstly, to prevent key exposition, based on the elliptic curve discrete logarithm problem (ECDLP), we constructed a double trapdoor hash function (DTH) and proved its reliability. Secondly, the multi-trapdoor hash function (MTH) based on DTH is presented. Finally, an MTH-based aggregate signature scheme (MTH-AS) with constant signature length is proposed. Based on the assumption of ECDLP, the proposed scheme is proven unforgeable against adaptive chosen message attacks with the Forking Lemma. Different from the most signature schemes with bilinear mapping, the proposed scheme has higher computational efficiency and shorter aggregate signature length. Moreover, it is independent of the number of signers. Security analysis and performance evaluation has revealed that the proposed scheme is an ideal solution for secure IoT applications with limited computing power, storage capacity, or limited bandwidth, such as wireless sensor networks, vehicular ad hoc networks, or healthcare sensor networks.


Author(s):  
Sumanth Koppula ◽  
Jayabhaskar Muthukuru

Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.


Author(s):  
Sumanth Koppula ◽  
Jayabhaskar Muthukuru

Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.


Sign in / Sign up

Export Citation Format

Share Document