z-logo
Premium
A certificateless signcryption scheme for smart home networks
Author(s) -
Ji Sai,
Huang Rui,
Shen Jian,
Jin Xin,
Cho Youngju
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.5081
Subject(s) - signcryption , eavesdropping , computer science , computer security , encryption , authentication (law) , scheme (mathematics) , computer network , internet privacy , public key cryptography , mathematical analysis , mathematics
Summary Smart home networks (SHNets) are based on the Internet of Things (IoT) and provide users with a highly intelligent home life. In recent years, SHNets have become more and more popular. In SHNets, a large amount of data interactions are needed. These data related to the privacy of users may be subject to attacks such as eavesdropping attacks, replay attacks, and mobile phone stolen attacks. Privacy protection and communication security in smart home networks have been widely studied by many scholars. However, most of the existing user authentication in current researches focus on identity‐based authentication, where the encryption protocols are divided into two steps: the signing step and the encryption step. In this paper, a certificateless signcryption scheme for SHNets is proposed which can provide biometric‐based user identity authentication. The security and performance analyses show that our scheme is efficient and secure.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here