Abstract

With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending on internet protocol (IP) networks, especially after the COVID-19 pandemic. The huge application domain’s infrastructure, which depends on IoT, requires a trusted connection to guarantee security and privacy while transferring data. This paper proposes a hybrid identity authentication pipeline that integrates three schemes, namely, an elliptic curve cryptography (ECC) scheme is integrated with the Ong, Schnorr, and Shamir (OSS) signature scheme and chaotic maps. The latter satisfies both security and guarantee criteria. The novelty of the proposal is in using chaotic mapping and a cyclic group to deduce a substitution box (S-Box) and a reversible matrix as a portion of the OSS signature equation. The ECC-based security part is an efficient public key cryptography mechanism with less computational cost, which makes it the most convenient to be used in IoT devices for authentication and privacy. The strength of the proposed scheme relies on combining the discrete logarithm problem (DLP) and integer factorization problem (IFP). The proposed approach was simulated using Lab-View and compared with other state-of-the art schemes. Extensive simulation results and analysis of the security and time rendering results confirmed its durability against different types of attacks, such as linear and differential attacks.

Highlights

  • In recent years, remote access technology and device control have become an imperative requirement

  • As readily seen in the figure, the resulting data highlight the high speed of applying the elliptic curve cryptography (ECC) with the OSS scheme with a key length of 1024

  • The proposed method is slightly faster than OSS–ECC as an additional level of S-Box is added to the total processing time

Read more

Summary

Introduction

Remote access technology and device control have become an imperative requirement. This is evident nowadays due to the increased spread of the coronavirus pandemic (COVID-19), which necessitated the imposition of some restrictions, including mandatory social distancing in many countries. It became clear how developing remote access communication technology is of immense importance depending on the Internet service, especially research in improving the technology of the Internet of things (IoT). Cryptanalysis techniques motivate researchers to develop novel signature schemes to dominate the growth in security attacks [5]. The cyclic group of order p was developed, which is isomorphic to the additive group of ((Z/pZ) ∗,.), where Z is the set of all integers, and p is a prime number

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call