Nothing Special   »   [go: up one dir, main page]

Skip to main content

Fast Verification of Digital Signatures in IoT

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Abstract

Internet of Things (IoT) is the recent advancement in Wireless technology where multiple embedded devices are connected through internet for exchange of information. Since the information exchanged is private and at times confidential, state of the art focusses at providing proper security to the system. To avoid illegal users from getting access to information system, authentication through Digital Signatures becomes integral part of IoT. Verifying individual signatures is a time consuming process, hence it is not advisable in IoT systems. Using Batch verification of Digital signatures, reduction in verification time is achievable. Hence in this paper, we have studied different RSA based batch verification techniques and their analysis is provided. Batch verification of digital signatures in IoT devices is a promising area for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., Marrocco, G.: RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J. 1(2), 144–152 (2014)

    Article  Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  3. Bao, F., Lee, C.-C., Hwang, M.-S.: Cryptanalysis and improvement on batch verifying multiple rsa digital signatures. Appl. Math. Comput. 172(2), 1195–1200 (2006)

    MATH  MathSciNet  Google Scholar 

  4. Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236–250. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054130

    Chapter  Google Scholar 

  5. Cocchia, A.: Smart and digital city: a systematic literature review. In: Dameri, R.P., Rosenthal-Sabroux, C. (eds.) Smart City. PI, pp. 13–43. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-06160-3_2

    Google Scholar 

  6. Du, K.-K., Wang, Z.-L., Hong, M.: Human machine interactive system on smart home of IoT. J. China Univ. Posts Telecommun. 20, 96–99 (2013)

    Google Scholar 

  7. Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  8. Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 175–185. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_17

    Chapter  Google Scholar 

  9. Gropp, W., Lusk, E., Doss, N., Skjellum, A.: A high-performance, portable implementation of the MPI message passing interface standard. Parallel Comput. 22(6), 789–828 (1996)

    Article  MATH  Google Scholar 

  10. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  11. Harn, L.: Batch verifying multiple DSA-type digital signatures. Electron. Lett. 34(9), 870–871 (1998)

    Article  Google Scholar 

  12. Harn, L.: Batch verifying multiple RSA digital signatures. Electron. Lett. 34(12), 1219–1220 (1998)

    Article  Google Scholar 

  13. Hernandez-Ramos, J.L., Pawlowski, M.P., Jara, A.J., Skarmeta, A.F., Ladid, L.: Toward a lightweight authentication and authorization framework for smart objects. IEEE J. Sel. Areas Commun. 33(4), 690–702 (2015)

    Article  Google Scholar 

  14. Jan, M.A., Nanda, P., He, X., Tan, Z., Liu, R.P.: A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205–211. IEEE (2014)

    Google Scholar 

  15. Jia, X., Feng, Q., Fan, T., Lei, Q.: Rfid technology and its applications in internet of things (IoT). In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 1282–1285. IEEE (2012)

    Google Scholar 

  16. Jie, Y., Pei, J.Y., Jun, L., Yun, G., Wei, X.: Smart home system based on IoT technologies. In: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS), pp. 1789–1791. IEEE (2013)

    Google Scholar 

  17. Jin, J., Gubbi, J., Marusic, S., Palaniswami, M.: An information framework for creating a smart city through internet of things. IEEE Internet Things J. 1(2), 112–121 (2014)

    Article  Google Scholar 

  18. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)

    MATH  Google Scholar 

  19. Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International Palo Alto (1979)

    Google Scholar 

  20. Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1–2. IEEE (2014)

    Google Scholar 

  21. Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 588–592. IEEE (2012)

    Google Scholar 

  22. Merkle, R.C.: Method of providing digital signatures, US Patent 4,309,569, 5 January 1982

    Google Scholar 

  23. Min-Shiang, H., Cheng-Chi, L., Yuan-Liang, T.: Two simple batch verifying multiple digital signatures. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 233–237. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45600-7_26

    Chapter  Google Scholar 

  24. Naccache, D., M’Raïhi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard —. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 77–85. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053426

    Chapter  Google Scholar 

  25. Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 351–355. IEEE (2013)

    Google Scholar 

  26. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  27. Shao, Z.: Batch verifying multiple DSA-type digital signatures. Comput. Netw. 37(3), 383–389 (2001)

    Article  Google Scholar 

  28. Xu, T., Wendt, J.B., Potkonjak, M.: Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, pp. 417–423. IEEE Press (2014)

    Google Scholar 

  29. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: Iot security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), pp. 230–234. IEEE (2014)

    Google Scholar 

  30. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 9th International Conference on Computational Intelligence and Security (CIS), pp. 663–667. IEEE (2013)

    Google Scholar 

  31. Zhu, Q., Wang, R., Chen, Q., Liu, Y., Qin, W.: IoT gateway: Bridgingwireless sensor networks into internet of things. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347–352. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Apurva S. Kittur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kittur, A.S., Jain, A., Pais, A.R. (2017). Fast Verification of Digital Signatures in IoT. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics