Open Access Open Access  Restricted Access Subscription Access

Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT)


Affiliations
1 Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
2 Department of Computer Science and Engineering, Government Engineering College, Kushalnagar, India
 

Multiparty computation is essential in offering a better form of non-repudiation, which is not much explored in past research work. A review of existing non-repudiation-based approaches found various shortcomings that do not offer a good balance between robust security and algorithm efficiency. Therefore, the proposed study presents a novel yet simple multiparty computation framework to ensure a higher degree of non-repudiation considering a use-case of a highly distributed and large network, i.e., Internet-of-Things (IoT). The study implements a unique encryption mechanism that uses a transformation strategy to perform encoding while using split key management to retain maximal secrecy and multiparty authentication for enhanced security. The simulation outcome of the study showcases that the proposed scheme offers approximately a 48% reduction in computation overhead, 54% minimization in delay, and 58% faster processing in contrast to frequently reported non-repudiation schemes.

Keywords

Multiparty Authentication, Encryption, Internet-of-Things, Key Management, Secrecy, Non-Repudiation
User
Notifications
Font Size

  • J. Tian, G. Ruifang and X. Jing, “Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession,” in IEEE Access, vol. 7, pp. 96686-96694, 2019, doi: 10.1109/ACCESS.2019.2916173.
  • D. Goyal, O. P. Verma, S. Balamurugan, Sheng-Lung Peng, Design and Analysis of Security Protocol for Communication, Wiley, ISBN: 9781119555643, 1119555647, 2020
  • D.C. Wilson, Cybersecurity, MIT Press, ISBN: 9780262542548, 0262542544, 2021
  • I.Pekaric, C.Sauerwein, S.Haselwanter, M.Felderer, “A taxonomy of attack mechanisms in the automotive domain,” Elsevier-Computer Standards & Interfaces, Volume 78, October 2021
  • R. Khatoun, Cybersecurity in Smart Homes-Architectures, Solutions and Technologies, Wiley, ISBN: 9781119987444, 111998744X, 2020
  • L. Bock, Modern Cryptography for Cybersecurity Professionals, Packt Publishing, ISBN: 9781838644352, 1838644350, 2021
  • A. Wirth, C. Gates, J. Smith, Medical Device Cybersecurity for Engineers and Manufacturers, Artech House, ISBN: 9781630818166, 163081816X, 2020
  • M. Faisal, I. Ali, M.S. Khan, J. Kim, and S.M. Kim, “Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges,” Hindawi-Complexity, Article ID 6619498, DOI: https://doi.org/10.1155/2020/6619498
  • G. Jayabalasamy, S.Koppu, “High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem,” Journal of King Saud University - Computer and Information Sciences, 2021
  • M. Sookhak, H. Tang, Y. He, F.R. Yu, “Security and Privacy of Smart Cities: A Survey, Research Issues, and Challenges,” IEEE Communications Surveys & Tutorials, VOL. 21, NO. 2, SECOND QUARTER 2019
  • H. A. Khattaka, M. A. Shah, S. Khan, I.Ali, M. Imran, “Perception layer security in Internet of Things,” Future Generation Computer Systems, Vol.100, pp.144-164, 2019
  • Divya K.S, Roopashree H.R, Yogeesh A C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022
  • M. M. Elamir, M. S. Mabrouk, and S. Y. Marzouk, “Secure framework for IoT technology based on RSA and DNA cryptography,” Egyptian Journal of Medical Human Genetics, vol.23, No.116, 2022
  • Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C.; Deng, Y.-Y. A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain. Appl. Sci. 2021, 11, 2843. https://doi.org/10.3390/app11062843
  • J. Sun, X. Yao, S. Wang, and Y. Wu, “Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS,” in IEEE Access, vol. 8, pp. 155145-155155, 2020, doi: 10.1109/ACCESS.2020.3018816.
  • F. Chen, J. Wang, J. Li, Y. Xu, C. Zhang, T. Xiang, "TrustBuilder: A non-repudiation scheme for IoT cloud applications", ACM-Computer and Security, vol.116, No.C, 2022. DOI: https://doi.org/10.1016/j.cose.2022.102664
  • W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, G. Wang, “Digital signature scheme for information non-repudiation in the blockchain: a state of the art review,” EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 56, 2020
  • D-H Lee, K. Yim, I-Y Lee, “A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments,” PubMed Central- Sensors(Basel). vol.20, No.14, 2020. doi: 10.3390/s20143983
  • J. Kar, X. Liu, F. Li, “CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks,” Journal of Information Security and Applications, Vol.61, Issue C, Sep 2021. DOI: https://doi.org/10.1016/j.jisa.2021.102905
  • J. Shen, Z. Gui, X. Chen, J. Zhang, and Y. Xiang, “Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks” in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 03, pp. 1464-1475, 2022.
  • K. Sudharani, P. N. K. Sakthivel, “A Secure Encryption Scheme Based on Certificateless Proxy Signature,” Springer, 2018
  • L. Harn, J. Ren, C. Lin, “Design of DL-based certificateless digital signatures,” Journal of Systems and Software, Vol.82, Issue 5, pp.789-793, 2009
  • D. Xiang, X. Li, J. Gao, X. Zhang, “A secure and efficient certificateless signature scheme for Internet of Things,” Elsevier- Ad Hoc Networks, Volume 124, 1 January 2022.
  • Kim, T.; Kim, W.; Seo, D.; Lee, I. Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. Sensors 2021, 21, 3474. https://doi.org/10.3390/s21103474
  • J. Singh, V. Kumar, R. Kumar, “An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks,” Springer, 2016
  • D. Toradmalle, J. Muthukuru, B Sathyanarayana, “Lightweight Certificate less Signcryption Scheme Based on Elliptic Curve,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-10, August 2019
  • S. Sharmila Deva Selvi, Pandu Rangan Chandrasekaran, “Efficient and provably secure certificateless multi-receiver signcryption,” IIT Madras Conference, Volume: 5324 LNCS, pp.52 - 67, 2008, DOI: 10.1007/978-3-540-88733-1-4
  • C. Jin, H. Zhu, W. Qin, Z. Chen, Y. Jin, J. Shan, “Heterogeneous online/offline signcryption for secure communication in Internet of Things,” Elsevier-Journal of Systems Architecture, Volume 127, June 2022
  • W. Zhang, Y. Zhang, C. Guo, Q. An, Y. Guo, X. Liu, S. Zhang, J. Huang, “Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things,” PubMed Central-Comput Intell Neurosci. 2022. 10.1155/2022/3687332
  • Meshram, C.; Imoize, A.L.; Aljaedi, A.; Alharbi, A.R.; Jamal, S.S.; Barve, S.K. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 2021, 21, 7039. https://doi.org/10.3390/s21217039
  • Nayab, S. Hussain, A. Alabrah, S. S. Ullah, H. Khattak, T. M. Alfakih, I. Ullah, “An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home,” ACM-Wireless Communications & Mobile ComputingVolume 2022, DOI: https://doi.org/10.1155/2022/4215441
  • A. M. Abdullah, I. Ullah, M. A. Khan, M. H. Alsharif, S. M. Mostafa, and J. M-T Wu, “An Efficient Multidocument Blind Signcryption Scheme for Smart Grid-Enabled Industrial Internet of Things,” Hindawi-Next-Generation Wireless Networks (NGWN) for Autonomous Intelligent Communications, Article ID 7779152, 2022, DOI:https://doi.org/10.1155/2022/7779152
  • P. Zhang, Y. Li, H. Chi, “An Elliptic Curve Signcryption Scheme and Its Application,” Hindawi-Wireless Communications and Mobile Computing, Article ID 7499836, 2022, DOI: https://doi.org/10.1155/2022/7499836
  • Ghosh, S.; Zaman, M.; Plourde, B.; Sampalli, S. A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks. Symmetry 2022, 14, 1625. https://doi.org/10.3390/sym14081625
  • A. P. Sarr, P. B. Seye, T. Ngarenon, "A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation", Springer-2019
  • R. M. Daniel, E.B. Rajsingh, S. Silas, “A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography,” Journal of King Saud University - Computer and Information Sciences, Vol.33, No.1, pp.86-98, 2021, DOI: https://doi.org/10.1016/j.jksuci.2018.02.004
  • Witanto, E.N.; Lee, S.-G. Cloud Storage Data Verification Using Signcryption Scheme. Appl. Sci. 2022, 12, 8602. https://doi.org/10.3390/app12178602
  • L. Li, X. Lu, K. Wang, “Hash-based signature revisited,” SprinegrOpen-Cybersecurity, vol.5, Article number: 13, 2022
  • Abbas, G.; Mehmood, A.; Carsten, M.; Epiphaniou, G.; Lloret, J. Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Netw. 2022, 11, 38. https://doi.org/10.3390/jsan11030038
  • S. Capkun, E. Ozturk, G, Tsudik, K. Wust, "ROSEN: RObust and SElective Non-repudiation (for TLS)", ACM-Proceedings of the 2021 on Cloud Computing Security Workshop, November 2021, Pages 97–109, DOI: https://doi.org/10.1145/3474123.3486763
  • H. K. Alper, A. Küpçü, “Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation,” ACM Transactions on Privacy and Security, Vol.25, Issue 1, February 2022, Article No.: 3, pp 1–34, DOI: https://doi.org/10.1145/3477530
  • P. Kalpana, “Amalgam Of Hamming Weight-Based RSA And Multi-Party Computations To Enhance Security In Multi-Cloud Ambience,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol.8, Issue-10, August 2019
  • Divya K.S, Dr.RoopaShree H.R, Dr.Yogesh A.C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022, PP 282-289, DOI:10.14569/IJACSA.2022.0130335.
  • M. Sharaf, J. Chen, E. Keedwell, “Non-repudiation and privacy-preserving sharing of electronic health records,” Taylor & Francis Online, Cogent Engineering, Vol.9, Iss.1, 2022. DOI: https://doi.org/10.1080/23311916.2022.2034374
  • A. Kumar, “A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy-preserving,” Springer-Multimedia Tools and Applications, vol.81, pages 21417–21448, 2022.
  • L. Wang, J. Li, L. Zuo, Y. Wen, H. Liu, W. Liu, “T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery,” ACM-Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure, May 2022, Pages 23–34, DOI: https://doi.org/10.1145/3494106.3528674
  • http://www.cmt-gmbh.de/MICAz.pdf (Accessed on 17-November, 2022).

Abstract Views: 207

PDF Views: 1




  • Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT)

Abstract Views: 207  |  PDF Views: 1

Authors

Divya K.S
Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
Roopashree H.R
Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
Yogeesh A.C
Department of Computer Science and Engineering, Government Engineering College, Kushalnagar, India

Abstract


Multiparty computation is essential in offering a better form of non-repudiation, which is not much explored in past research work. A review of existing non-repudiation-based approaches found various shortcomings that do not offer a good balance between robust security and algorithm efficiency. Therefore, the proposed study presents a novel yet simple multiparty computation framework to ensure a higher degree of non-repudiation considering a use-case of a highly distributed and large network, i.e., Internet-of-Things (IoT). The study implements a unique encryption mechanism that uses a transformation strategy to perform encoding while using split key management to retain maximal secrecy and multiparty authentication for enhanced security. The simulation outcome of the study showcases that the proposed scheme offers approximately a 48% reduction in computation overhead, 54% minimization in delay, and 58% faster processing in contrast to frequently reported non-repudiation schemes.

Keywords


Multiparty Authentication, Encryption, Internet-of-Things, Key Management, Secrecy, Non-Repudiation

References





DOI: https://doi.org/10.22247/ijcna%2F2023%2F218513