International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT)

Author NameAuthor Details

Divya K.S, Roopashree H.R, Yogeesh A.C

Divya K.S[1]

Roopashree H.R[2]

Yogeesh A.C[3]

[1]Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India

[2]Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India

[3]Department of Computer Science and Engineering, Government Engineering College, Kushalnagar, India

Abstract

Multiparty computation is essential in offering a better form of non-repudiation, which is not much explored in past research work. A review of existing non-repudiation-based approaches found various shortcomings that do not offer a good balance between robust security and algorithm efficiency. Therefore, the proposed study presents a novel yet simple multiparty computation framework to ensure a higher degree of non-repudiation considering a use-case of a highly distributed and large network, i.e., Internet-of-Things (IoT). The study implements a unique encryption mechanism that uses a transformation strategy to perform encoding while using split key management to retain maximal secrecy and multiparty authentication for enhanced security. The simulation outcome of the study showcases that the proposed scheme offers approximately a 48% reduction in computation overhead, 54% minimization in delay, and 58% faster processing in contrast to frequently reported non-repudiation schemes.

Index Terms

Multiparty Authentication

Encryption

Internet-of-Things

Key Management

Secrecy

Non-Repudiation

Reference

  1. 1.
    J. Tian, G. Ruifang and X. Jing, “Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession,” in IEEE Access, vol. 7, pp. 96686-96694, 2019, doi: 10.1109/ACCESS.2019.2916173.
  2. 2.
    D. Goyal, O. P. Verma, S. Balamurugan, Sheng-Lung Peng, Design and Analysis of Security Protocol for Communication, Wiley, ISBN: 9781119555643, 1119555647, 2020
  3. 3.
    D.C. Wilson, Cybersecurity, MIT Press, ISBN: 9780262542548, 0262542544, 2021
  4. 4.
    I.Pekaric, C.Sauerwein, S.Haselwanter, M.Felderer, “A taxonomy of attack mechanisms in the automotive domain,” Elsevier-Computer Standards & Interfaces, Volume 78, October 2021
  5. 5.
    R. Khatoun, Cybersecurity in Smart Homes-Architectures, Solutions and Technologies, Wiley, ISBN: 9781119987444, 111998744X, 2020
  6. 6.
    L. Bock, Modern Cryptography for Cybersecurity Professionals, Packt Publishing, ISBN: 9781838644352, 1838644350, 2021
  7. 7.
    A. Wirth, C. Gates, J. Smith, Medical Device Cybersecurity for Engineers and Manufacturers, Artech House, ISBN: 9781630818166, 163081816X, 2020
  8. 8.
    M. Faisal, I. Ali, M.S. Khan, J. Kim, and S.M. Kim, “Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges,” Hindawi-Complexity, Article ID 6619498, DOI: https://doi.org/10.1155/2020/6619498
  9. 9.
    G. Jayabalasamy, S.Koppu, “High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem,” Journal of King Saud University - Computer and Information Sciences, 2021
  10. 10.
    M. Sookhak, H. Tang, Y. He, F.R. Yu, “Security and Privacy of Smart Cities: A Survey, Research Issues, and Challenges,” IEEE Communications Surveys & Tutorials, VOL. 21, NO. 2, SECOND QUARTER 2019
  11. 11.
    H. A. Khattaka, M. A. Shah, S. Khan, I.Ali, M. Imran, “Perception layer security in Internet of Things,” Future Generation Computer Systems, Vol.100, pp.144-164, 2019
  12. 12.
    Divya K.S, Roopashree H.R, Yogeesh A C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022
  13. 13.
    M. M. Elamir, M. S. Mabrouk, and S. Y. Marzouk, “Secure framework for IoT technology based on RSA and DNA cryptography,” Egyptian Journal of Medical Human Genetics, vol.23, No.116, 2022
  14. 14.
    Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C.; Deng, Y.-Y. A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain. Appl. Sci. 2021, 11, 2843. https://doi.org/10.3390/app11062843
  15. 15.
    J. Sun, X. Yao, S. Wang, and Y. Wu, “Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS,” in IEEE Access, vol. 8, pp. 155145-155155, 2020, doi: 10.1109/ACCESS.2020.3018816.
  16. 16.
    F. Chen, J. Wang, J. Li, Y. Xu, C. Zhang, T. Xiang, "TrustBuilder: A non-repudiation scheme for IoT cloud applications", ACM-Computer and Security, vol.116, No.C, 2022. DOI: https://doi.org/10.1016/j.cose.2022.102664
  17. 17.
    W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, G. Wang, “Digital signature scheme for information non-repudiation in the blockchain: a state of the art review,” EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 56, 2020
  18. 18.
    D-H Lee, K. Yim, I-Y Lee, “A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments,” PubMed Central- Sensors(Basel). vol.20, No.14, 2020. doi: 10.3390/s20143983
  19. 19.
    J. Kar, X. Liu, F. Li, “CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks,” Journal of Information Security and Applications, Vol.61, Issue C, Sep 2021. DOI: https://doi.org/10.1016/j.jisa.2021.102905
  20. 20.
    J. Shen, Z. Gui, X. Chen, J. Zhang, and Y. Xiang, “Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks” in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 03, pp. 1464-1475, 2022.
  21. 21.
    K. Sudharani, P. N. K. Sakthivel, “A Secure Encryption Scheme Based on Certificateless Proxy Signature,” Springer, 2018
  22. 22.
    L. Harn, J. Ren, C. Lin, “Design of DL-based certificateless digital signatures,” Journal of Systems and Software, Vol.82, Issue 5, pp.789-793, 2009
  23. 23.
    D. Xiang, X. Li, J. Gao, X. Zhang, “A secure and efficient certificateless signature scheme for Internet of Things,” Elsevier- Ad Hoc Networks, Volume 124, 1 January 2022.
  24. 24.
    Kim, T.; Kim, W.; Seo, D.; Lee, I. Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. Sensors 2021, 21, 3474. https://doi.org/10.3390/s21103474
  25. 25.
    J. Singh, V. Kumar, R. Kumar, “An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks,” Springer, 2016
  26. 26.
    D. Toradmalle, J. Muthukuru, B Sathyanarayana, “Lightweight Certificate less Signcryption Scheme Based on Elliptic Curve,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-10, August 2019
  27. 27.
    S. Sharmila Deva Selvi, Pandu Rangan Chandrasekaran, “Efficient and provably secure certificateless multi-receiver signcryption,” IIT Madras Conference, Volume: 5324 LNCS, pp.52 - 67, 2008, DOI: 10.1007/978-3-540-88733-1-4
  28. 28.
    C. Jin, H. Zhu, W. Qin, Z. Chen, Y. Jin, J. Shan, “Heterogeneous online/offline signcryption for secure communication in Internet of Things,” Elsevier-Journal of Systems Architecture, Volume 127, June 2022
  29. 29.
    W. Zhang, Y. Zhang, C. Guo, Q. An, Y. Guo, X. Liu, S. Zhang, J. Huang, “Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things,” PubMed Central-Comput Intell Neurosci. 2022. 10.1155/2022/3687332
  30. 30.
    Meshram, C.; Imoize, A.L.; Aljaedi, A.; Alharbi, A.R.; Jamal, S.S.; Barve, S.K. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 2021, 21, 7039. https://doi.org/10.3390/s21217039
  31. 31.
    Nayab, S. Hussain, A. Alabrah, S. S. Ullah, H. Khattak, T. M. Alfakih, I. Ullah, “An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home,” ACM-Wireless Communications & Mobile ComputingVolume 2022, DOI: https://doi.org/10.1155/2022/4215441
  32. 32.
    A. M. Abdullah, I. Ullah, M. A. Khan, M. H. Alsharif, S. M. Mostafa, and J. M-T Wu, “An Efficient Multidocument Blind Signcryption Scheme for Smart Grid-Enabled Industrial Internet of Things,” Hindawi-Next-Generation Wireless Networks (NGWN) for Autonomous Intelligent Communications, Article ID 7779152, 2022, DOI:https://doi.org/10.1155/2022/7779152
  33. 33.
    P. Zhang, Y. Li, H. Chi, “An Elliptic Curve Signcryption Scheme and Its Application,” Hindawi-Wireless Communications and Mobile Computing, Article ID 7499836, 2022, DOI: https://doi.org/10.1155/2022/7499836
  34. 34.
    Ghosh, S.; Zaman, M.; Plourde, B.; Sampalli, S. A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks. Symmetry 2022, 14, 1625. https://doi.org/10.3390/sym14081625
  35. 35.
    A. P. Sarr, P. B. Seye, T. Ngarenon, "A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation", Springer-2019
  36. 36.
    R. M. Daniel, E.B. Rajsingh, S. Silas, “A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography,” Journal of King Saud University - Computer and Information Sciences, Vol.33, No.1, pp.86-98, 2021, DOI: https://doi.org/10.1016/j.jksuci.2018.02.004
  37. 37.
    Witanto, E.N.; Lee, S.-G. Cloud Storage Data Verification Using Signcryption Scheme. Appl. Sci. 2022, 12, 8602. https://doi.org/10.3390/app12178602
  38. 38.
    L. Li, X. Lu, K. Wang, “Hash-based signature revisited,” SprinegrOpen-Cybersecurity, vol.5, Article number: 13, 2022
  39. 39.
    Abbas, G.; Mehmood, A.; Carsten, M.; Epiphaniou, G.; Lloret, J. Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Netw. 2022, 11, 38. https://doi.org/10.3390/jsan11030038
  40. 40.
    S. Capkun, E. Ozturk, G, Tsudik, K. Wust, "ROSEN: RObust and SElective Non-repudiation (for TLS)", ACM-Proceedings of the 2021 on Cloud Computing Security Workshop, November 2021, Pages 97–109, DOI: https://doi.org/10.1145/3474123.3486763
  41. 41.
    H. K. Alper, A. Küpçü, “Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation,” ACM Transactions on Privacy and Security, Vol.25, Issue 1, February 2022, Article No.: 3, pp 1–34, DOI: https://doi.org/10.1145/3477530
  42. 42.
    P. Kalpana, “Amalgam Of Hamming Weight-Based RSA And Multi-Party Computations To Enhance Security In Multi-Cloud Ambience,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol.8, Issue-10, August 2019
  43. 43.
    Divya K.S, Dr.RoopaShree H.R, Dr.Yogesh A.C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022, PP 282-289, DOI:10.14569/IJACSA.2022.0130335.
  44. 44.
    M. Sharaf, J. Chen, E. Keedwell, “Non-repudiation and privacy-preserving sharing of electronic health records,” Taylor & Francis Online, Cogent Engineering, Vol.9, Iss.1, 2022. DOI: https://doi.org/10.1080/23311916.2022.2034374
  45. 45.
    A. Kumar, “A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy-preserving,” Springer-Multimedia Tools and Applications, vol.81, pages 21417–21448, 2022.
  46. 46.
    L. Wang, J. Li, L. Zuo, Y. Wen, H. Liu, W. Liu, “T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery,” ACM-Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure, May 2022, Pages 23–34, DOI: https://doi.org/10.1145/3494106.3528674
  47. 47.
    http://www.cmt-gmbh.de/MICAz.pdf (Accessed on 17-November, 2022).
SCOPUS
SCImago Journal & Country Rank