Next Article in Journal
Cosmological Solutions from a Multi-Measure Model with Inflaton Field
Next Article in Special Issue
Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning
Previous Article in Journal
A Vision-Based Robotic Laser Welding System for Insulated Mugs with Fuzzy Seam Tracking Control
Previous Article in Special Issue
Security-Oriented Architecture for Managing IoT Deployments
Open AccessArticle

A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications

1
HIET, Hamdard University, Islamabad Campus, Islamabad 44000, Pakistan
2
IT Department, Hazara University, Mansehra, Mansehra 21120, KP, Pakistan
3
Tecnologico de Monterrey,Escuela de Ingenieria y Ciencias, Monterrey 64849, Mexico
4
Department of IT, Abbottabad University of Science and Technology, Havelian City 22500, Pakistan
5
Faculty of Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur 54100, Malaysia
*
Author to whom correspondence should be addressed.
Symmetry 2019, 11(11), 1386; https://doi.org/10.3390/sym11111386
Received: 18 August 2019 / Revised: 3 October 2019 / Accepted: 4 October 2019 / Published: 8 November 2019
Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sensors to merge with several smart devices to monitor machine status, environment, and collect data from industrial devices. On the other hand, cloud computing provides a good platform for storing crowdsourced data of IIoT. Due to the semi-trusted nature of cloud computing and communication through open channels, the IIoT environment needs security services such as confidentiality and authenticity. One such solution is provided by the identity-based signcryption. Unfortunately, the identity-based signcryption approach suffers from the key escrow problem. Certificateless signcryption is the alternative of identity-based signcryption that can resolve the key escrow problem. Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication overhead. The security and efficiency of the proposed approach are based on the hyper elliptic curve cryptosystem. The hyper elliptic curve is the advance version of the elliptic curve having small parameters and key size of 80 bits as compared to the elliptic curve which has 160-bits key size. Further, we validate the security requirements of our approach through automated validation of Internet security protocols and applications (AVISPA) tool with the help of high level protocol specification language (HLPSL). Moreover, our lightweight and secured scheme will attract low resource devices and will become a perk in the environment of IIoT. View Full-Text
Keywords: signcryption; certificateless signcryption; crowdsourcing; IIoT; cloud computing; AVISPA; hyper elliptic curve signcryption; certificateless signcryption; crowdsourcing; IIoT; cloud computing; AVISPA; hyper elliptic curve
Show Figures

Figure 1

MDPI and ACS Style

Ullah, I.; Ul Amin, N.; Zareei, M.; Zeb, A.; Khattak, H.; Khan, A.; Goudarzi, S. A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications. Symmetry 2019, 11, 1386.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop