Efficient Digital Signature Scheme for Industrial Internet of Things using semi-group
Keywords:
Wireless technology, pervasive, IIoT environmentAbstract
With rapid advancement in wireless technology and pervasive digital technology have provided in increasing popularity and interest of Internet Industrial of Things (IoT) methodology, ubiquitously giving convenience and intelligence to our daily activities. In IoT based system scenario, smart components are associated everywhere as universal things linked in a pervasive model. Ensuring privacy for intersection amongst smart objects is significantly more important, in this paper, we propose a novel signature scheme which is utilized for carrying communication amongst devices in IIoT environment. Moreover we revealed different scheme that are vulnerable. The significance of the proposed scheme over other existing scheme are analyzed in terms of the summary which is illustrated using performance and security comparison.
References
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal, 4(5), 1250-1258.
Sangeetha, S. K. B., Muthukumaran, V., Deeba, K., Rajadurai, H., Maheshwari, V., & Dalu, G. T. (2022). Multiconvolutional Transfer Learning for 3D Brain Tumor Magnetic Resonance Images. Computational Intelligence and Neuroscience, 2022.
Muthukumaran, V., Natarajan, R., Kaladevi, A. C., Magesh, G., & Babu, S. (2022). Traffic flow prediction in inland waterways of Assam region using uncertain spatiotemporal correlative features. Acta Geophysica, 1-12.
Merlin Linda, G., Sree Rathna Lakshmi, N. V. S., Murugan, N. S., Mahapatra, R. P., Muthukumaran, V., & Sivaram, M. (2022). Intelligent recognition system for viewpoint variations on gait and speech using CNN-CapsNet. International Journal of Intelligent Computing and Cybernetics, 15(3), 363-382.
Shen, L., Ma, J., Liu, X., Wei, F., & Miao, M. (2016). A secure and efficient ID-based aggregate signature scheme for wireless sensor networks. IEEE Internet of Things Journal, 4(2), 546-554.
Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for IIoT environments. IEEE Transactions on Industrial Informatics, 14(8), 3701-3711.
Gothai, E., Muthukumaran, V., Valarmathi, K., Sathishkumar, V. E., Thillaiarasu, N., & Karthikeyan, P. (2022). Map-Reduce based Distance Weighted k-Nearest Neighbor Machine Learning Algorithm for Big Data Applications. Scalable Computing: Practice and Experience, 23(4), 129-145.
Yeh, K. H., Su, C., Choo, K. K. R., & Chiu, W. (2017). A novel certificateless signature scheme for smart objects in the Internet-of-Things. Sensors, 17(5), 1001.
Huang, Y., Zhang, X., & Yu, B. (2017). Efficient anti-replay identity-based signature scheme for wireless body area network. J. Cryptol. Res, 4, 447-457.
Sreedhar Kumar, S., Ahmed, S. T., Mercy Flora, P., Hemanth, L. S., Aishwarya, J., GopalNaik, R., & Fathima, A. (2021, January). An Improved Approach of Unstructured Text Document Classification Using Predetermined Text Model and Probability Technique. In ICASISET 2020: Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India (p. 378). European Alliance for Innovation.
Krishnamoorthy, S., Muthukumaran, V., Yu, J., & Balamurugan, B. (2019, August). A secure privacy preserving proxy re-encryption scheme for IoT security using near-ring. In Proceedings of the 2019 the International Conference on Pattern Recognition and Artificial Intelligence (pp. 27-32).
Ezhilmaran, D., & Muthukumaran, V. (2018). Authenticated Group Key Agreement Protocol Based on Twisted Conjugacy Root Extraction Problem in Near-Ring. Journal of Computational and Theoretical Nanoscience, 15(6-7), 2023-2026.
Fathima, A. S., & Manjunath, S. (2022). Biomedical Image Recurrence Identification Using Image Registration Technique. International Journal of Computational Learning & Intelligence, 1(1), 37-41.
Basha, S. M., Ahmed, S. T., Iyengar, N. C. S. N., & Caytiles, R. D. (2021, December). Inter-locking dependency evaluation schema based on block-chain enabled federated transfer learning for autonomous vehicular systems. In 2021 Second International Conference on Innovative Technology Convergence (CITC) (pp. 46-51). IEEE.
Yang, X., Chen, C., Ma, T., Li, Y., & Wang, C. (2018, October). An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. In 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 2334-2338). IEEE.
Yang, X. D., Xiao, L. K., Chen, C. L., & Wang, C. F. (2018). A strong designated verifier proxy re-signature scheme for IoT environments. Symmetry, 10(11), 580.
Al-Shammari, N. K., Alzamil, A. A., Albadarn, M., Ahmed, S. A., Syed, M. B., Alshammari, A. S., & Gabr, A. M. (2021). Cardiac stroke prediction framework using hybrid optimization algorithm under DNN. Engineering, Technology & Applied Science Research, 11(4), 7436-7441.
Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11, 1065-1083.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 V. Muthukumaran, K Arun
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.