| Literature DB >> 30650609 |
Subhan Ullah1,2, Lucio Marcenaro3, Bernhard Rinner4.
Abstract
Smart cameras are key sensors in Internet of Things (IoT) applications and often capture highly sensitive information. Therefore, security and privacy protection is a key concern. This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step. We deploy signcryption to efficiently protect sensitive data onboard the cameras and secure the data transfer from multiple cameras to multiple monitoring devices. Our multi-sender/multi-receiver approach provides integrity, authenticity, and confidentiality of data with decryption fairness for multiple receivers throughout the entire lifetime of the data. It further provides public verifiability and forward secrecy of data. Our certificateless multi-receiver aggregate-signcryption protection has been implemented for a smart camera IoT scenario, and the runtime and communication effort has been compared with single-sender/single-receiver and multi-sender/single-receiver setups.Entities:
Keywords: Internet of Things; data security; elliptic-curve signcryption; multi-receiver aggregate-signcryption; resource efficiency; smart cameras
Year: 2019 PMID: 30650609 PMCID: PMC6359113 DOI: 10.3390/s19020327
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison with state-of-the-art approaches. Legend: CL: certificateless, A: authenticity, I: integrity, C: confidentiality, DF: decryption fairness, PV: public verifiability, Au: authorization, CP: computation, CM: communication, Sc: scalability, PA: proposed approach.
| Ref. | Algorithms | Implementation Procedure | Security Properties | M-to-M Efficiency | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Approach | CL | A | I | C | DF | PV | Au | CP | CM | Sc | ||
| [ | eCLSC, CLDA | agg.signc, TKEM/DEM | ✓ | ✓ | ✓ | ✓ | 1 | ✓ | 1 | ✗ | ✗ | M-1 |
| [ | KCDSA, SKE | signcryption | ✓ | ✓ | ✓ | ✓ | 1 | ✓ | 1 | ✗ | ✗ | 1-1 |
| [ | ECDSA, SKE | IBC, DH, signcryption | ✗ | ✓ | ✓ | ✓ | 1 | ✗ | 1 | ✗ | ✗ | 1-1 |
| [ | AES, BLS | abf-agg.signcryption | ✗ | ✓ | ✓ | ✓ | 1 | ✓ | 1 | ✗ | ✗ | M-1 |
| [ | RSA, AES | sign-then-encrypt | ✗ | ✓ | ✓ | ✓ | 1 | ✗ | 1 | ✗ | ✗ | 1-1 |
| [ | HMAC, AES | encrypt-then-sign | ✗ | ✓ | ✓ | ✓ | 1 | ✗ | 1 | ✗ | ✗ | 1-1 |
| [ | RSA, AES | sign-then-encryp | ✗ | ✓ | ✓ | ✓ | 1 | ✗ | 1 | ✗ | ✗ | 1-1 |
| [ | ECDSA, AES | signcryption | ✗ | ✓ | ✓ | ✓ | 1 | ✓ | 1 | ✗ | ✗ | 1-1 |
| [ | ECDSA, AES | agg-signcryption | ✗ | ✓ | ✓ | ✓ | 1 | ✓ | 1 | ✗ | ✗ | M-1 |
| PA | EC-ShDSA, AES | agg-signcryption | ✓ | ✓ | ✓ | ✓ |
| ✓ |
| ✓ | ✓ | M-M |
Figure 1The IoT system architecture. The cluster-based multi-camera network merges individual-signcryptexts into aggregated-signcryptext and provides access to them for multiple monitoring devices. Aggregated-signcryptexts are permanently stored on a backup server. A key generation center provides public parameters and partial private keys for all components of the system architecture.
Figure 2Key generation and distribution in the deployment phase. First, the KGC chooses public parameters and the master secret key and then generates the master public key based on the chosen private key. The smart camera and monitoring device choose their private keys and generate their respective public values. They share their public values with KGC in steps 1 and 3 to request partial private keys. They receive the requested relevant partial private keys in steps 2 and 4 from the KGC, respectively. The smart cameras and monitoring devices generate their full public keys based on their relevant private and partial private keys and share them with each other through a public channel in steps 5 and 6.
Figure 3Operational phase depicting the processing flow of aggregate-signcryption for smart cameras in cluster i sending protected data to multiple monitoring devices (multi-receiver). The left side shows multi-cameras (sender devices) and right side shows the monitoring devices (multi-receiver). The distribution of keys and public parameters is shown by dotted lines, and the transfer of actual data is shown by solid lines, where d and X represent the partial keys and represents the aggregate-signcryptext data for multi-receiver (monitoring devices).
Notation.
|
|
|
|---|---|
|
| Bit length of security parameters |
|
| Large prime number |
|
| Base point of EC of order |
|
| Finite field over prime number |
|
| Elliptic curve over |
|
| Set of additive integers over mod |
|
| Set of multiplicative integers over mod |
|
| Master secret key chosen by KGC |
|
| Master public key of KGC |
|
| Group field generated by EC with base point |
|
| One-way and collision resistant hash functions |
| Input space of arbitrary and fixed length, respectively | |
| Secret value of smart camera and monitoring device, respectively | |
|
| Secret value chosen by KGC for partial key generation of smart camera |
|
| The concatenated value of |
| Time period chosen for smart camera | |
|
| Represent the smart camera |
| Part of public values chosen by smart camera and monitoring device | |
| Part of public values generated by smart camera and monitoring devices using | |
| Private keys of smart camera and monitoring device | |
| Identities of smart cameras and monitoring devices | |
| partial keys of smart cameras and monitoring devices | |
| Public key of smart camera and monitoring device | |
|
| Secret keys of smart cameras in cluster |
|
| Secret value chosen by smart camera during symmetric key generation |
|
| Value computed by smart camera during signcryption |
| One-time encryption and decryption keys | |
|
| List of the monitoring devices |
|
| Individual-ciphertext for |
|
| The combined data of individual-ciphertexts |
|
| Random number chosen by smart camera |
|
| The sum of the signature part |
|
| Number of frames for the region of interest (RoI) |
|
| Represent aggregate-signcryptext data |
| Hash values generated by smart cameras and monitoring devices |
Keys generation and verification time (in ms) in the deployment phase. Legend: SC: smart camera, MD: monitoring device, KGC: key generation center, Pa: partial, Pu: public, TT: total time. The symbol—indicates that the required action is not performed on the corresponding device for the key generation or verification.
| Computational Time (all in [ms]) | ||||||
|---|---|---|---|---|---|---|
| Devices | Generation Algorithm | Verification Algorithm | TT | |||
| Pa-Key-Request | Pu-key | Pa-Key | Pa-Key | Pa-Key-Request | ||
| SC | 100.7 | 85.2 | – | 31.9 | – | 217.8 |
| MD | 100.3 | 84.7 | – | 32.2 | – | 217.2 |
| KGC | – | 20.2 | 47 | – | 32.3 | 99.5 |
Computational time for individual-signcryption. Legend: SC: smart camera, MD: monitoring device, ST: signcryption time, VT: verification time, DT: decryption time.
| Id | SC | MD | |
|---|---|---|---|
| ST [ms] | VT [ms] | DT [ms] | |
| C1 | 320.5 | 155.4 | 283.8 |
| C2 | 321.0 | 154.7 | 285.0 |
| C3 | 319.8 | 156.0 | 284.7 |
| C4 | 321.3 | 155.3 | 286.2 |
| C5 | 320.7 | 154.8 | 283.9 |
Computational time for aggregate-signcryption. Legend: SC: smart camera, CH: cluster head, MD: monitoring device, ST: signcryption time, AT: aggregation time, VT: verification time, DT: decryption time.
| Id | SC | CH | MD | |
|---|---|---|---|---|
| ST [ms] | AT [ms] | VT [ms] | DT [ms] | |
| C1 | 320.7 | 145.5 | 160.3 | 284.9 |
| C2 | 321.2 | 285.0 | ||
| C3 | 319.9 | 286.3 | ||
| C4 | 321.1 | 284.9 | ||
| C5 | 322.0 | 285.4 | ||
Computational time for multi-receiver aggregate-signcryption. Legend: SC: smart camera, CH: cluster head, MD: monitoring device, ST: signcryption time, AT: aggregation time, VT: verification time, DT: decryption time.
| Id | SC | CH | MD | |
|---|---|---|---|---|
| ST [ms] | AT [ms] | VT [ms] | DT [ms] | |
| C1 | 345.4 | 166.2 | 172.4 | 288.3 |
| C2 | 346.0 | 287.7 | ||
| C3 | 345.2 | 286.9 | ||
| C4 | 344.9 | 288.5 | ||
| C5 | 345.5 | 287.6 | ||
Comparisons of total times (in ms) of different approaches for one smart camera/one monitoring device (1-1), five smart cameras/one monitoring device (5-1) and five smart cameras and three monitoring devices (5-3).
| Scenario | Individual-Signcryption | Aggregate-Signcryption | Multi-Receiver Aggregate-Signcryption |
|---|---|---|---|
| 1-1 | 759.7 | 911.4 | 972.3 |
| 5-1 | 2521.1 | 2054.3 | 2123.6 |
| 5-3 | 3166.6 | 2989.0 | 2124.9 |
Comparisons of communication efficiency in terms of transferred data and number of data transfers of different approaches for one smart camera/one monitoring device (1-1), five smart cameras/one monitoring device (5-1) and five smart cameras/three monitoring devices (5-3). Legend: SD: signcryptext data, CD: ciphertext data, ED: extra data for signature and verification, NT: number of transfers.
| Scenario | Individual-Signcryption | Aggregate-Signcryption | Multi-Receiver Aggregate-Signcryption | ||||||
|---|---|---|---|---|---|---|---|---|---|
| SD | NT | SD | NT | SD | NT | ||||
| CD [kB] | ED [B] | CD [kB] | ED [B] | CD [kB] | ED [B] | ||||
| 1-1 | 750 | 72 | 1 | 750 | 72 | 2 | 750 | 340 | 2 |
| 5-1 | 3750 | 360 | 5 | 3750 | 168 | 6 | 3750 | 340 | 6 |
| 5-3 | 11,250 | 1080 | 15 | 11,250 | 504 | 18 | 3750 | 388 | 8 |