Skip to main content
Top

2024 | OriginalPaper | Chapter

Comments on “A Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0”

Authors : Girraj Kumar Verma, Dheerendra Mishra

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, the fusion of industrial processes and communication technologies has emerged as Industry 4.0. In this emergence, smart devices such as sensors and mobile phones and machines have become data prosumers (i.e., producer and consumer both simultaneously). The exchange of data between these prosumers takes place using the public Internet. In this system, generally, producers send colossal data to consumers via a cloud server. So that, the consumer can easily access the required data. As prosumers are generally resource-constrained smart devices (like sensors, actuators, etc.), therefore, the processing and analysis of such massive data are done by the cloud servers. Thus, the receiver device gets processed data. However, sometimes the response is delayed. To overcome the latency, cloud computing and fog computing have been merged together so that the time-bound data may be processed on the fog node, as it is near to prosumers. However, due to public connection, the security and privacy issues like data leakage/modification or illegal admittance are major problems. To banish such issues, a certificateless aggregated signcryption scheme has been proposed by Dohare et al. (published in IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2022.3142306). However, after a detailed analysis, we found various flaws in their scheme. In this paper, we present the cryptanalysis of the Dohare et al.’s scheme. To show the cryptanalysis effectively, we present a detailed discussion by pondering the mathematical and theoretical concepts.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xu LD (2011) Enterprise systems: state-of-the-art and future trends. IEEE Trans Ind Inf 7(4):630–640 Xu LD (2011) Enterprise systems: state-of-the-art and future trends. IEEE Trans Ind Inf 7(4):630–640
4.
go back to reference Zhang W, Zhang Z, Chao HC (2017) Cooperative fog computing for dealing with big data in the internet of vehicles: architecture and hierarchical resource management. IEEE Commun Mag 55(12):60–67 Zhang W, Zhang Z, Chao HC (2017) Cooperative fog computing for dealing with big data in the internet of vehicles: architecture and hierarchical resource management. IEEE Commun Mag 55(12):60–67
5.
go back to reference Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864 Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864
6.
go back to reference Jiang L, Xu LD, Cai H, Jiang Z, Bu F, Xu B (2014, May) An IoT-oriented data storage framework in cloud computing platform. IEEE Trans Ind Inf 10(2):1443–1451 Jiang L, Xu LD, Cai H, Jiang Z, Bu F, Xu B (2014, May) An IoT-oriented data storage framework in cloud computing platform. IEEE Trans Ind Inf 10(2):1443–1451
7.
go back to reference Fu J, Liu Y, Chao H, Bhargava BK, Zhang Z. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inf 14(10):4519–4528 Fu J, Liu Y, Chao H, Bhargava BK, Zhang Z. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inf 14(10):4519–4528
8.
go back to reference Turner CJ, Oyekan J, Stergioulas L, Griffin D (2021) Utilizing Industry 4.0 on the construction site: challenges and opportunities. IEEE Trans Ind Inform 17(2):746–756 Turner CJ, Oyekan J, Stergioulas L, Griffin D (2021) Utilizing Industry 4.0 on the construction site: challenges and opportunities. IEEE Trans Ind Inform 17(2):746–756
9.
go back to reference Tewari N, Budhani SK (2022) Analysis of risk and security within fog computing-enabled e-healthcare system in Uttarakhand. In: Cyber security and digital forensics. Springer, Singapore, pp 21–30 Tewari N, Budhani SK (2022) Analysis of risk and security within fog computing-enabled e-healthcare system in Uttarakhand. In: Cyber security and digital forensics. Springer, Singapore, pp 21–30
10.
go back to reference Choo K-KR, Gritzalis S, Park JH (2018) Cryptographic solutions for industrial internet-of-things: research challenges and opportunities. IEEE Trans Ind Inform 14(8):3567–356 Choo K-KR, Gritzalis S, Park JH (2018) Cryptographic solutions for industrial internet-of-things: research challenges and opportunities. IEEE Trans Ind Inform 14(8):3567–356
11.
go back to reference Liu Y, Ma X, Shu L, Hancke GP, Abu-Mahfouz AM (2021, June) From Industry 4.0 to Agriculture 4.0: current status, enabling technologies, and research challenges. IEEE Trans Ind Inform 17(6):4322–4334 Liu Y, Ma X, Shu L, Hancke GP, Abu-Mahfouz AM (2021, June) From Industry 4.0 to Agriculture 4.0: current status, enabling technologies, and research challenges. IEEE Trans Ind Inform 17(6):4322–4334
12.
go back to reference Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Annual international cryptology conference, 1 7 Aug 1997. Springer, Berlin, pp 165–179 Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Annual international cryptology conference, 1 7 Aug 1997. Springer, Berlin, pp 165–179
13.
go back to reference Malone-Lee J (2002) Identity-based signcryption. IACR Cryptol ePrint Arch 98 Malone-Lee J (2002) Identity-based signcryption. IACR Cryptol ePrint Arch 98
14.
go back to reference Barbosa M, Farshim P (2008) Certificateless signcryption. In: Abe M, Gligor V (eds) Proceedings of the 2008 ACM symposium on information, computer and communications security (ASIACCS08). ACM, New York, pp 369–372 Barbosa M, Farshim P (2008) Certificateless signcryption. In: Abe M, Gligor V (eds) Proceedings of the 2008 ACM symposium on information, computer and communications security (ASIACCS08). ACM, New York, pp 369–372
15.
go back to reference Li F, Shirase M, Takagi T (2009) Certificateless hybrid signcryption. In: Information security practice and experience—ISPEC 2009, vol 5451 of LNCS. Springer, Berlin, pp 112–123 Li F, Shirase M, Takagi T (2009) Certificateless hybrid signcryption. In: Information security practice and experience—ISPEC 2009, vol 5451 of LNCS. Springer, Berlin, pp 112–123
16.
go back to reference Selvi SSD, Sree Vivek S, Pandu Rangan C (2010) Certificateless KEM and hybrid signcryption schemes revisited. In: International conference on information security practice and experience. Springer, Berlin Selvi SSD, Sree Vivek S, Pandu Rangan C (2010) Certificateless KEM and hybrid signcryption schemes revisited. In: International conference on information security practice and experience. Springer, Berlin
17.
go back to reference Li F, Shirase M, Takagi T (2013) Certificateless hybrid signcryption. Math Comput Model 57(3–4):324–343 Li F, Shirase M, Takagi T (2013) Certificateless hybrid signcryption. Math Comput Model 57(3–4):324–343
18.
go back to reference Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Networks 23(1):145–158 Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Networks 23(1):145–158
19.
go back to reference Gong B, Wu Y, Wang Q, Ren YH, Guo C (2022) A secure and lightweight certificateless hybrid signcryption scheme for internet of things. Future Gener Comput Syst 127:23–30 Gong B, Wu Y, Wang Q, Ren YH, Guo C (2022) A secure and lightweight certificateless hybrid signcryption scheme for internet of things. Future Gener Comput Syst 127:23–30
21.
go back to reference Selvi S, Sree Vivek S, Shriram J, Kalaivani S, Pandu Rangan C (2009) Identity based aggregate signcryption schemes. In: International conference on cryptology in India. Springer, Berlin, pp 378–397 Selvi S, Sree Vivek S, Shriram J, Kalaivani S, Pandu Rangan C (2009) Identity based aggregate signcryption schemes. In: International conference on cryptology in India. Springer, Berlin, pp 378–397
22.
go back to reference Ren X-Y, Qi Z-H, Geng Y (2012) Provably secure aggregate signcryption scheme. ETRI J 34(3):421–428 Ren X-Y, Qi Z-H, Geng Y (2012) Provably secure aggregate signcryption scheme. ETRI J 34(3):421–428
23.
go back to reference Kar J (2015) Provably secure identity based aggregate signcryption scheme in random Oracle model. Int J Network Secur 17(5):580–587 Kar J (2015) Provably secure identity based aggregate signcryption scheme in random Oracle model. Int J Network Secur 17(5):580–587
24.
go back to reference Karati A, Islam SH, Biswas GP, Bhuiyan MZ, Vijayakumar P, Karuppiah M (2017) Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J 5(4):2904–2914 Karati A, Islam SH, Biswas GP, Bhuiyan MZ, Vijayakumar P, Karuppiah M (2017) Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J 5(4):2904–2914
25.
go back to reference Swapna G, Reddy PV (2019) Efficient identity based aggregate signcryption scheme using bilinear pairings over elliptic curves. J Phys Conf Ser 1344(1):012010 Swapna G, Reddy PV (2019) Efficient identity based aggregate signcryption scheme using bilinear pairings over elliptic curves. J Phys Conf Ser 1344(1):012010
26.
go back to reference Lu H, Qi X (2011) An efficient certificateless aggregate signcryption scheme from pairings. In: 2011 International conference on electronics, communications and control (ICECC). IEEE, Ningbo, China Lu H, Qi X (2011) An efficient certificateless aggregate signcryption scheme from pairings. In: 2011 International conference on electronics, communications and control (ICECC). IEEE, Ningbo, China
27.
go back to reference Yin S-L, Li H, Liu J (2016) A new provable secure certificateless aggregate signcryption scheme. J Inf Hiding Multimedia Signal Process 7(6):1274–1281 Yin S-L, Li H, Liu J (2016) A new provable secure certificateless aggregate signcryption scheme. J Inf Hiding Multimedia Signal Process 7(6):1274–1281
28.
go back to reference Ullah S, Russo F, Marcenaro L, Rinner B (2018) Aggregate-signcryption for securing smart camera IoT applications. In: Proceedings of the global internet things summit (GIoTS), Bilbao, Spain, June 2018, pp 1–6 Ullah S, Russo F, Marcenaro L, Rinner B (2018) Aggregate-signcryption for securing smart camera IoT applications. In: Proceedings of the global internet things summit (GIoTS), Bilbao, Spain, June 2018, pp 1–6
29.
go back to reference Kim T-H et al (2020) CASCF: certificateless aggregated SignCryption framework for Internet-of-Things infrastructure. IEEE Access 8L94748–94756 Kim T-H et al (2020) CASCF: certificateless aggregated SignCryption framework for Internet-of-Things infrastructure. IEEE Access 8L94748–94756
30.
go back to reference Dohare I, Singh K, Ahmadian A, Mohan S (2022) Certificateless aggregated signcryption scheme for cloud-fog centric Industry 4.0. IEEE Trans Ind Inform 18(9):6349–6357 Dohare I, Singh K, Ahmadian A, Mohan S (2022) Certificateless aggregated signcryption scheme for cloud-fog centric Industry 4.0. IEEE Trans Ind Inform 18(9):6349–6357
Metadata
Title
Comments on “A Certificateless Aggregated Signcryption Scheme for Cloud-Fog Centric Industry 4.0”
Authors
Girraj Kumar Verma
Dheerendra Mishra
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_48