2017
DOI: 10.3390/s17051001
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

Abstract: Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(52 citation statements)
references
References 26 publications
0
52
0
Order By: Relevance
“…Arduino Mega is also compatible with IoT applications. (Mejías et al, 2017;Yeh, Su, Choo, & Chiu, 2017). This system can be also upgraded with solar energy kit and mobile phone (GSM) kit for off-grid electric supply and IoT applications.…”
Section: Discussionmentioning
confidence: 99%
“…Arduino Mega is also compatible with IoT applications. (Mejías et al, 2017;Yeh, Su, Choo, & Chiu, 2017). This system can be also upgraded with solar energy kit and mobile phone (GSM) kit for off-grid electric supply and IoT applications.…”
Section: Discussionmentioning
confidence: 99%
“…Based on the work in [ 42 ], the time consumption of AES encryption operation is approximately 2.76 ms, the time consumption of hash operation is approximately 1.5 ms and the time consumption of HMAC operation is approximately 3.54 ms. A pseudorandom number generation operation is approximately 0.65 ms as shown in [ 43 ]. Our protocol needs 12 extra hash function and two random number generation operations to complete static authentication in comparison with the protocol in [ 18 ].…”
Section: Protocol Analysismentioning
confidence: 99%
“…Digital signatures are widely used to ensure data authenticity and integrity. Yeh et al [4] devised a CLS scheme for IoT environments. However, Jia et al [40] demonstrated that Yeh et al’s scheme [4] was insecure against PKR attacks and then proposed a new CLS scheme to overcome the flaws of Yeh et al’s scheme [4].…”
Section: Related Workmentioning
confidence: 99%
“…Various IoT-enabled devices with embedded sensors collect and send IoT data to data centres over public networks; thus, the issues of security and privacy in IoT environments have become increasingly important [4,5]. Only authentic data can be stored in data centres, which requires the integrity and authenticity of the data transmitted by an IoT device to be checked before being stored.…”
Section: Introductionmentioning
confidence: 99%