Abstract

Abstract The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and then encrypt it. Signcryption is a technique where the signature and the encryption are performed in a single round. The current Signcryption system uses traditional cryptographic approaches that are overloaded for IoT, as it consists of resource-constrained devices and uses the weak session key to encrypt the data. We propose a hybrid Signcryption scheme that employs PRESENT, a lightweight block cipher algorithm to encrypt the data, and the session key is encrypted by ECC. The time taken to signcrypt the proposed Signcryption is better when compared to current Signcryption techniques, as it deploys lightweight cryptography techniques that are devoted to resource-constrained devices.

Highlights

  • IoT is a widely trending pervasive paradigm that interconnects heterogeneous devices like RFID tags, smart meters, various sensors, and physical things with the internet

  • The objective of this research is to ensure the non-repudiation, integrity, and confidentiality at low computation cost, to propose security solutions that lower the overhead to the resource-constrained IoT environment, and to take advantage of both symmetric and asymmetric cryptographic approaches by combining both the approaches

  • Signcryption scheme is less time consuming than the traditional signature and encrypt and applicable to the IoT environment comprises of resource-constrained device, where time taken, is an important factor

Read more

Summary

Introduction

IoT is a widely trending pervasive paradigm that interconnects heterogeneous devices like RFID tags, smart meters, various sensors, and physical things with the internet. By connecting things to internet, they are accessible dynamically from anywhere at any time. The objects connected to the internet facilitate the user to monitor and actuate in the environment dynamically irrespective. The objective of this research is to ensure the non-repudiation, integrity, and confidentiality at low computation cost, to propose security solutions that lower the overhead to the resource-constrained IoT environment, and to take advantage of both symmetric and asymmetric cryptographic approaches by combining both the approaches. Signcryption ensures confidentiality, integrity, and non-repudiation in a single step. The asymmetric approach is much stronger and a little time consuming than the symmetric approach. By combining both the symmetric and asymmetric cryptographic techniques, a hybrid Signcryption system is being

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.