Abstract

The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats to sensitive user information. User authentication and key agreement have been provided for secure end-to-end communication. However, stricter security techniques are required as billions of massive devices are being networked to collect and process complex user data in real-time. Therefore, anonymous authentication and authorization are highly coveted for privacy preservation and prevention of unlawful exploitation of user data. However, guaranteeing data integrity, authentication, and non-repudiation require special-purpose identity-based signature techniques that are quite difficult to design in practice. In order to address this problem, this paper proposes a lightweight, provably secure identity-based online/offline signature technique (IBOOST) and its extension for massive devices in 5G-WSNs using fractional chaotic maps. The IBOOST scheme achieves multi-time use of offline storage at a lower processing time. Therefore, the signer can reuse the offline pre-stored information in a polynomial time. This makes our IBOOST superior to the existing online/offline signature techniques that allow only a single signature. Additionally, the new technique enables the pre-registration process with a secret key, and no secret key is required in the offline stage. Also, the proposed IBOOST proves to be secure in the random oracle unforgeability under the chosen message attack (UF-IBS-CMA). Finally, the IBOOST and its enhanced version (A-IBOOST) give the lowest computational costs compared to several contending techniques. Therefore, the proposed IBOOST shows superior security and performance with better computational overhead than the preliminary techniques.

Highlights

  • The fifth-generation (5G) wireless networks that are rapidly deployed worldwide have ushered in great relief to the proliferating issues inherent in the ubiquitous 4G wireless networks [1]. 5G wireless networks support the application of blockchain technology [2], holographic communication [3], Industrial Internet of Things (IIoT) [4], wireless security networks [5], and more

  • We present an extension to the identity-based online/offline signature technique (IBOOST) to support the registration of various messages and implementing them in the 5G-wireless sensor network (WSN) environment

  • We tested the IBOOST using standard metrics and compared it with the existing techniques, and we demonstrate that our IBOOST gives greater efficiency in terms of communication and computational costs

Read more

Summary

INTRODUCTION

The fifth-generation (5G) wireless networks that are rapidly deployed worldwide have ushered in great relief to the proliferating issues inherent in the ubiquitous 4G wireless networks [1]. 5G wireless networks support the application of blockchain technology [2], holographic communication [3], Industrial Internet of Things (IIoT) [4], wireless security networks [5], and more. The transmission of personal data over these wireless channels needs to be supported by lightweight and provably secure online/offline identity-based signature techniques (IBS) [15]. The scheme is extendable and supports offline signatures leveraging pre-stored information and enabling an aggregation scheme for WSN-based applications. Motivation and Contribution: We present a detailed literature review of the existing lightweight, provably secure identity-based online/offline signature techniques. A lightweight, provably secure identity-based online/offline signature technique (IBOOST) based on FCM for massive devices in 5G wireless sensor networks is required to achieve low computational costs. Provably secure IBOOST based on Fractional Chaotic Maps (FCM) for massive devices in 5G-WSNs. The IBOOST is protected in a situation of random oracle unforgeability of IBS under chosen message attack (UF-IBS-CMA).

BACKGROUND
PROPERTIES OF CHAOTIC MAPS
COMPUTATIONAL PROBLEMS
THE PROPOSED IBOOST TECHNIQUE BASED ON FRACTIONAL CHAOTIC MAPS
OFFLINE SIGNING
VERIFICATION
SECURITY EXAMINATIONS AND DISCUSSIONS
BASIC SETTING ON MASSIVE DEVICES IN 5G WIRELESS SENSOR NETWORKS
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call