An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment

      

ABSTARCT :

Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.

EXISTING SYSTEM :

? We also compared our proposed scheme with relevant existing IBS schemes and the results show that the given scheme is more efficient in terms of computation and communication overheads than the previous. ? An IBS scheme is considered to achieve the security assets of unforgeability if there exists no intruder which can compromise the private key of the producer. ? We used a lightweight Hyperelliptic Curve Cryptosystem (HCC) for the efficiency in terms of computation and communication overheads. ? NDN aimed to offer in-network caching, built-in mobility support, and named-based routing that can provide scalable connectivity to the IoT devices with efficient information access to the end-users.

DISADVANTAGE :

? A trusted party termed as Certification Authority (CA), issues and distributes certificates by attaching customers’ identities to their public keys. ? The KGC can serve as a target unit for any attacker which is generally known as a key-escrow (KE) problem. ? However, the proposed scheme suffers from the major key escrow problem inborn with identity-based cryptography. ? Due to the nature of IoT applications and the working principle of NDN, new issues with the use of the NDN architecture in IoT environments are slowing down the aspirations. ? Due to its novel architecture NDN facing some security issues in the context of IoT networks; Among them, CPA is the most critical and demanding.

PROPOSED SYSTEM :

• In this paper, we proposed a secure NDN framework for IoTenabled Healthcare (IoTEH). • In the proposed work, we adopt the services of Identity-Based Signcryption (IBS) cryptography under the security hardness Hyperelliptic Curve Cryptosystem (HCC) to secure the IoTEH information in NDN. • We deployed the proposed scheme on the IoTEH in NDN infrastructure and compared it with the recent IBS schemes in terms of computation and communication overheads. • We proposed a secure NDN framework for Internet of Things Enabled Healthcare (IoTEH) using Identity-Based Signacryption (IBS) cryptography.

ADVANTAGE :

? In fact, NDN facilitates large-scale IoT deployment by improving the performance, scalability and security of the network by optimizing the usage and power consumption of the device. ? The performance efficiency of BNT confirms that this attack is devastating and alarming in NDN. ? Multi-precision integer and rational arithmetic C library (MIRACL) are used to measure the performance of the proposed operations. ? The performance efficiency of BNT confirms that this attack is devastating and alarming in NDN. ? It clearly shows that the designed scheme is more efficient than the previous schemes in terms of computational cost.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp