Abstract

The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure end-to-end communication, key agreement and user authentication have been proposed. However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required. Data integrity, non-repudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty difficult to create in practice. To address this issue, this work provides an efficient, provably secure, lightweight subtree-based online/offline signature procedure (SBOOSP) and its aggregation (Agg-SBOOSP) for massive devices in 5G WSNs using conformable chaotic maps. The SBOOSP enables multi-time offline storage access while reducing processing time. As a result, the signer can utilize the pre-stored offline information in polynomial time. This feature distinguishes our presented SBOOSP from previous online/offline-signing procedures that only allow for one signature. Furthermore, the new procedure supports a secret key during the pre-registration process, but no secret key is necessary during the offline stage. The suggested SBOOSP is secure in the logic of unforgeability on the chosen message attack in the random oracle. Additionally, SBOOSP and Agg-SBOOSP had the lowest computing costs compared to other contending schemes. Overall, the suggested SBOOSP outperforms several preliminary security schemes in terms of performance and computational overhead.

Highlights

  • Massive access configuration enables the sharing of radio spectrum amongst an enormous number of devices

  • We present an extension to the proposed subtree-based online/offline signature procedure (SBOOSP) to facilitate the registration and implementation of different messages in 5G-enabled wireless sensor networks (5G wireless sensor networks (WSNs))

  • It is worth mentioning that Conformable Chaotic Maps (CCM)-based lightweight schemes are highly coveted to support the security of critical user information transmitted over 5G WSNs channels

Read more

Summary

Introduction

Massive access configuration enables the sharing of radio spectrum amongst an enormous number of devices. Massive devices are designed using cost-effective nodes, and they have limited computational processing power. They are not able to satisfy the high complexity requirements of advanced encryption techniques. Sensor nodes in WSNs can be configured and integrated into billions of massive machine-type communication (MTC) devices (MD) in 5G wireless networks to facilitate user data transmission over WSN-assisted channels [5–7]. There are growing concerns that the security of these channels is grossly limited, and the need to secure sensitive user data being transmitted over these channels is not negotiable [8] Toward this end, efficient, provably secure, and lightweight subtree-based online/offline signature procedures are currently being exploited to address this problem

Motivation and Contribution
Paper Organization
Related Works
Background and Material
Notations
Chebyshev Chaotic Polynomials
The chaotic properties
Conformable Chebyshev Chaotic Maps (CCCM)
Extraction
Offline-Signing
Verification
Security Investigations and Discussions
Online-Signing
Performance Investigation
Procedures
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call