LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments
نویسندگان
چکیده
There is an increasing drive to provide improved levels of trust within Internet-of-Things (IoTs) environments, but the devices and sensors used tend be limited in their capabilities for dealing with traditional cryptography methods. Resource constraints security are often two major concerns IIoT (Industrial IoT applications big data generation at present time. The strict measures not significantly resource-managed therefore, negotiation normally takes place between these. Following this, various light-weight versions generic primitives have been developed other resource-constrained sustainability. In this paper, we address authentication environments by designing efficient protocol. Our scheme based on LiSP (light-weight Signcryption Protocol); however, some further customization has performed it make more suitable IIoT-like environments. We use Keccack as hash function process Elli public-key cryptography. name our scheme: Extended Protocol Keccack (LiSP-XK). paper outlines a comparative analysis new design against range state-of-the-art schemes. find suitability LiSP-XK like due its lesser complexity less energy consumption. Moreover, signcryption also beneficial enhancing security. Overall shows that overall 35% better efficiency compared approaches.
منابع مشابه
SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices
To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sig...
متن کاملEfficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices
Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...
متن کاملmHealth in Resource-Constrained Environments
The use of mobile devices in telemedicine contributes to providing more effective and efficient remote healthcare in rural areas improving patients’ life style and medical quality of service in this setting. The idea of creating mobile applications for this scenario led the authors to face important sociotechnical challenges in terms of innovation and design for resource-constrained environment...
متن کاملA Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3097267