2019
DOI: 10.3390/s19020327
|View full text |Cite
|
Sign up to set email alerts
|

Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications

Abstract: Smart cameras are key sensors in Internet of Things (IoT) applications and often capture highly sensitive information. Therefore, security and privacy protection is a key concern. This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step. We deploy signcryption to efficiently protect sensitive data onboard the cameras and secure the data transfer from multiple cameras to multiple m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 55 publications
0
15
0
Order By: Relevance
“…With the growing public concerns over Internet privacy and security, there is an urgent appeal for research into secure communications in massive IoT. Pioneering works include the aggregate-signcryption [1], decentralized blockchain [2], FORGE system [3], and chaotic maps [4]. In this paper, we address this issue with a novel approach based on secret image sharing.…”
Section: Introductionmentioning
confidence: 99%
“…With the growing public concerns over Internet privacy and security, there is an urgent appeal for research into secure communications in massive IoT. Pioneering works include the aggregate-signcryption [1], decentralized blockchain [2], FORGE system [3], and chaotic maps [4]. In this paper, we address this issue with a novel approach based on secret image sharing.…”
Section: Introductionmentioning
confidence: 99%
“…The CA bounds the public key as the identity of a participant with certificates. Some of the shortcomings typical of the PKI approach are certificate distribution, storage and manufacturing difficulties [9]. On the other hand, an identity-based cryptosystem [10] is used to reduce the cost of public key management; however, it suffers from the private key escrow problem [11,12] because the trusted third-party Private Key Generator [PKG] has firsthand information about the participants' private keys.…”
Section: Introductionmentioning
confidence: 99%
“…The two basic methods used to validate the public keys are Identity-Based Cryptography (IBC) and Public Key Infrastructure (PKI) in public key cryptosystems. This includes a Certificate Authority (CA) signature, which provides a unique signature link [ 9 ]. The CA specifies the public keys with the certificates as defining a participant.…”
Section: Introductionmentioning
confidence: 99%