Skip to main content
Log in

OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The technological breakthroughs of Internet of thing (IoT) applications in various sectors are nowadays contributing to the development of smart mobile IoT (SM-IoT). Lack of authentication and encryption schemes make SM-IoT more susceptible to major security and privacy issues. Signcryption has evolved as a new paradigm in recent years that provides better authenticity and security to the messages and minimizes both computation cost and communication costs simultaneously. To secure the communicated message on the sender and receiver sides, this paper proposes an efficient and secure decentralized communication system to offer personalized service for the users. The proposed network framework comprises four key entities namely trusted service providers, gateways, resource senders, and receivers. The master private keys are generated at the initial setup phase. Then, the optimal partial private keys are extracted and broadcasted through the channel by the key extraction process utilizing the fuzzy whale sine cosine levy algorithm. The ciphertext is generated for the sender on signcryption using a modified Identity-based Cryptography approach. The signcryption ciphertext generated is broadcasted via gateways to the receiver by measuring verification parameters. Finally, the designcryption process is performed using the certificateless hybrid signcryption scheme to retrieve the plaintext message. The proposed secure communication network is evaluated using performance metrics such as bilinear pairing time, modular experimentation time, pairing-based experimentation time, elliptic curve (EC) scalar point multiplication time, map-to-point hash function time, and EC point addition time. The experimental results revealed the effectiveness of the proposed secure communication framework on both the sender and receiver sides.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and material

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Jin, C., Zhu, H., Qin, W., Chen, Z., Jin, Y., & Shan, J. (2022). Heterogeneous online/offline signcryption for secure communication in Internet of Things. Journal of Systems Architecture, 127, 102522.

    Article  Google Scholar 

  2. Al-Zubi, M., & Abu-Shareha, A. A. (2019). Efficient signcryption scheme based on El-Gamal and Schnorr. Multimedia Tools and Applications, 78(9), 11091–11104.

    Article  Google Scholar 

  3. Gong, B., Wu, Y., Wang, Q., Ren, Y. H., & Guo, C. (2022). A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things. Future Generation Computer Systems, 127, 23–30.

    Article  Google Scholar 

  4. Niu, S., Shao, H., Hu, Y., Zhou, S., & Wang, C. (2022). Privacy-preserving mutual heterogeneous signcryption schemes based on 5G network slicing. IEEE Internet of Things Journal, 9(19), 19086–19100.

    Article  Google Scholar 

  5. Cai, Y., Zhang, H., & Fang, Y. (2020). A conditional privacy protection scheme based on ring signcryption for vehicular ad hoc networks. IEEE Internet of Things Journal, 8(1), 647–656.

    Article  Google Scholar 

  6. Khan, M. A., Shah, H., Rehman, S. U., Kumar, N., Ghazali, R., Shehzad, D., & Ullah, I. (2021). Securing internet of drones with identity-based proxy signcryption. IEEE Access, 9, 89133–89142.

    Article  Google Scholar 

  7. Luo, M., Pei, Y., & Huang, W. (2021). Mutual heterogeneous signcryption schemes with different system parameters for 5G network slicings. Wireless Networks, 27(3), 1901–1912.

    Article  Google Scholar 

  8. Liu, X., Wang, Z., Ye, Y., & Li, F. (2020). An efficient and practical certificateless signcryption scheme for wireless body area networks. Computer Communications, 162, 169–178.

    Article  Google Scholar 

  9. Peng, C., Chen, J., Obaidat, M. S., Vijayakumar, P., & He, D. (2019). Efficient and provably secure multi-receiver signcryption scheme for multicast communication in edge computing. IEEE Internet of Things Journal, 7(7), 6056–6068.

    Article  Google Scholar 

  10. Khasawneh, S., & Kadoch, M. (2021). ECS-CP-ABE: A lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge-envisioned advanced metering infrastructure networks. Transactions on Emerging Telecommunications Technologies, 32(8), 4102.

    Article  Google Scholar 

  11. Elhoseny, M., & Shankar, K. (2019). Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Transactions on Reliability, 69(3), 1077–1086.

    Article  Google Scholar 

  12. Naresh, V. S., Reddi, S., Kumari, S., Allavarpu, V. D., Kumar, S., & Yang, M. H. (2021). Practical Identity based online/off-line signcryption scheme for secure communication in Internet of Things. IEEE Access, 9, 21267–21278.

    Article  Google Scholar 

  13. Ali, I., Lawrence, T., Omala, A. A., & Li, F. (2020). An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 69(10), 11266–11280.

    Article  Google Scholar 

  14. Shankar, K., Elhoseny, M., Perumal, E., Ilayaraja, M., & Sathesh Kumar, K. (2019). An efficient image encryption scheme based on signcryption technique with adaptive elephant herding optimization. In Cybersecurity and Secure Information Systems (pp. 31–42). Springer, Cham.

  15. Hussain, S., Ullah, I., Khattak, H., Khan, M. A., Chen, C. M., & Kumari, S. (2021). A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). Journal of Information Security and Applications, 58, 102625.

    Article  Google Scholar 

  16. Su, J., Ren, R., Li, Y., Lau, R. Y., & Shi, Y. (2022). Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs. Wireless Communications and Mobile Computing.

  17. Qiu, J., Fan, K., Zhang, K., Pan, Q., Li, H., & Yang, Y. (2019). An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access, 7, 180205–180217.

    Article  Google Scholar 

  18. Lim, S. J. (2022). Hybrid image embedding technique using Steganographic Signcryption and IWT-GWO methods. Microprocessors and Microsystems, 95, 104688.

    Article  Google Scholar 

  19. Seyyedabbasi, A. (2022). WOASCALF: A new hybrid whale optimization algorithm based on sine cosine algorithm and levy flight to solve global optimization problems. Advances in Engineering Software, 173, 103272.

    Article  Google Scholar 

  20. Gougam, F., Rahmoune, C., Benazzouz, D., Afia, A., & Zair, M. (2020). Bearing faults classification under various operation modes using time domain features, singular value decomposition, and fuzzy logic system. Advances in Mechanical Engineering, 12(10), 1687814020967874.

    Article  Google Scholar 

  21. Abbas, S. A., & Maryoosh, A. A. B. (2016). Data security for cloud computing based on elliptic curve integrated encryption scheme (ECIES) and modified identity based cryptography (MIBC). International Journal of Applied Information Systems (IJAIS)10(6).

  22. Shan, S. (2022). Cryptanalysis of a certificateless hybrid signcryption scheme and a certificateless encryption scheme for Internet of Things. Security and Communication Networks.

  23. Tsai, T. T., Tseng, Y. M., & Huang, S. S. (2023). Leakage-resilient certificateless signcryption scheme under a continual leakage model. IEEE Access.

  24. Rao, Y. S., Prasad, S., Bera, S., Das, A. K., & Susilo, W. (2023). Boolean searchable attribute-based signcryption with search results self-verifiability mechanism for data storage and retrieval in clouds. IEEE Transactions on Services Computing.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumithra Alagarsamy.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alagarsamy, S., Nagarajan, V. & Devi, M.M.Y. OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model. Wireless Netw (2024). https://doi.org/10.1007/s11276-023-03624-x

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-023-03624-x

Keywords

Navigation