Abstract
Background: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern.
Proposed Work: In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confidentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, desynchronization attack, impersonation attack, key-compromise attack, location tracking attack, denial of service attack, and man-in-the-middle attack.
Results: Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes.
Conclusion: The proposed protocol presented in this paper can be used as a building block in designing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards.
Keywords: Security, low computing power devices, RFID, WSN, smart card, signcryption.
Graphical Abstract
[http://dx.doi.org/10.2478/cait-2019-0008]
[http://dx.doi.org/10.1007/978-3-319-04223-7_1]
[http://dx.doi.org/10.1007/978-3-642-03829-7_10]
[http://dx.doi.org/10.1016/S1363-4127(05)70039-X]
[http://dx.doi.org/10.1007/978-3-642-35473-1_1]
[http://dx.doi.org/10.1007/s10916-014-0046-9] [PMID: 24756871]
[http://dx.doi.org/10.1109/ PlatCon.2016.7456822]
[http://dx.doi.org/10.1007/s10916-015-0362-8] [PMID: 26573649]
[http://dx.doi.org/10.1109/CSE-EUC.2017.245]
[http://dx.doi.org/10.1002/sec.1558]
[http://dx.doi.org/10.1016/j.comnet.2016.01.006]
[http://dx.doi.org/10.3390/s16122123] [PMID: 27983616]
[http://dx.doi.org/10.1109/ACCESS.2017.2673239]
[http://dx.doi.org/10.3390/s17030644] [PMID: 28335572]
[http://dx.doi.org/10.3390/s17122946] [PMID: 29257066]
[http://dx.doi.org/10.1016/j.jnca.2017.07.001]
[http://dx.doi.org/10.1155/2018/2484268]
[http://dx.doi.org/10.1007/s11277-015-2735-1]
[http://dx.doi.org/10.1007/s11277-016-3745-3]
[http://dx.doi.org/10.1109/TIFS.2017.2659640]
[http://dx.doi.org/10.1007/s11277-017-3961-5]
[http://dx.doi.org/10.1155/2018/9178941]
[http://dx.doi.org/10. 1007/BFb0052234]
[http://dx.doi.org/10.1016/S0020-0190(98)00167-7]
[http://dx.doi.org/10.1007/978-3-540-68914-0_29]