Open Access iconOpen Access

ARTICLE

crossmark

Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

by Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

1 Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, 50603, Malaysia
2 Department of Computer Science, University of Swat, Saidu Sharif, 19130, Pakistan
3 Center for Research in Mobile Cloud Computing, University of Malaya, Kuala Lumpur, 50603, Malaysia
4 Department of Quantitative Methods and Economic Informatics, Faculty of Operation and Economics of Transport and Communications, University of Zilina, 010 26 Zilina, Slovakia
5 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
6 Department of Computer Science, College of Sciences and Arts in Rass, Qassim University, Buraydah, 51452, Saudi Arabia
7 Department of Computer Science, Hamdard Institute of Engineering and Technology, Islamabad, 44000, Pakistan

* Corresponding Author: Mohd Yamani Idna Idris. Email: email

(This article belongs to the Special Issue: Next - Generation Secure Solutions for Wireless Communications, IoT and SDNs)

Computers, Materials & Continua 2022, 71(2), 2515-2532. https://doi.org/10.32604/cmc.2022.019800

Abstract

Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a hyperelliptic curve cryptography (HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with the aim of improving security while lowering computational and communication overhead in IIoT environment. HECC with 80-bit smaller key and parameters sizes offers similar security as elliptic curve cryptography (ECC) with 160-bit long key and parameters sizes. We assessed the IIoT-CS scheme security by applying formal and informal security evaluation techniques. We used Real or Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formal security analysis and proved that the IIoT-CS scheme provides resistance to various attacks. Our proposed IIoT-CS scheme is relatively less expensive compared to the current state-of-the-art in terms of computational cost and communication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead, respectively, compared to the most recent protocol.

Keywords


Cite This Article

APA Style
Ali, U., Idna Idris, M.Y., Frnda, J., Bin Ayub, M.N., Alroobaea, R. et al. (2022). Hyper elliptic curve based certificateless signcryption scheme for secure iiot communications. Computers, Materials & Continua, 71(2), 2515-2532. https://doi.org/10.32604/cmc.2022.019800
Vancouver Style
Ali U, Idna Idris MY, Frnda J, Bin Ayub MN, Alroobaea R, Almansour F, et al. Hyper elliptic curve based certificateless signcryption scheme for secure iiot communications. Comput Mater Contin. 2022;71(2):2515-2532 https://doi.org/10.32604/cmc.2022.019800
IEEE Style
U. Ali et al., “Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications,” Comput. Mater. Contin., vol. 71, no. 2, pp. 2515-2532, 2022. https://doi.org/10.32604/cmc.2022.019800



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2201

    View

  • 1271

    Download

  • 0

    Like

Share Link