{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T22:04:58Z","timestamp":1722549898457},"reference-count":52,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,11,17]]},"abstract":"Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). This paper presents a new concept of CLC to IBC heterogeneous generalized signcryption for the first time to fulfil the prime security requirements of NDN-based IoT. The proposed scheme provides the security properties according to situational needs without disturbing the structural policy of NDN. Considering the resource-constrained nature of IoT, we used a lightweight type of elliptic curve called the hyperelliptic curve cryptosystem which offers the same level of security as that of bilinear pairing and an elliptic curve cryptosystem using a minimum key size. Further, we compare the proposed scheme with recently proposed identity-based as well as certificateless generalized signcryption schemes, and the results give satisfactory outputs in terms of computational and communication resources. Furthermore, we simulate the proposed scheme with Automated Validation of Internet Security Protocols and Applications (AVISPA), and the results show that our scheme is valid and safe. Additionally, we provide a practical scenario of the proposed on NDN with an IoT-based smart city.<\/jats:p>","DOI":"10.1155\/2020\/8857272","type":"journal-article","created":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T02:35:59Z","timestamp":1605753359000},"page":"1-20","source":"Crossref","is-referenced-by-count":10,"title":["A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things"],"prefix":"10.1155","volume":"2020","author":[{"given":"Manazara","family":"Rehman","sequence":"first","affiliation":[{"name":"IT Department, Hazara University, Mansehra, 21120 KP, Pakistan"}]},{"given":"Hizbullah","family":"Khattak","sequence":"additional","affiliation":[{"name":"IT Department, Hazara University, Mansehra, 21120 KP, Pakistan"}]},{"given":"Ahmed Saeed","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0380-283X","authenticated-orcid":true,"given":"Insaf","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computing, HIET, Hamdard University, Islamabad Campus, Islamabad 44000, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0429-7361","authenticated-orcid":true,"given":"Muhammad","family":"Adnan","sequence":"additional","affiliation":[{"name":"Division of Computer and Information Sciences, Higher Colleges of Technology, 17155, Al Ain, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5406-0389","authenticated-orcid":true,"given":"Syed Sajid","family":"Ullah","sequence":"additional","affiliation":[{"name":"IT Department, Hazara University, Mansehra, 21120 KP, Pakistan"}]},{"given":"Noor Ul","family":"Amin","sequence":"additional","affiliation":[{"name":"IT Department, Hazara University, Mansehra, 21120 KP, Pakistan"}]},{"given":"Saddam","family":"Hussain","sequence":"additional","affiliation":[{"name":"IT Department, Hazara University, Mansehra, 21120 KP, Pakistan"}]},{"given":"Shah Jahan","family":"Khattak","sequence":"additional","affiliation":[{"name":"Pakistan Engineering Council (PEC), Attatruk Avenue (East) Sector G-5\/2, Islamabad 44000, Pakistan"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6104-8"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.12.039"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957152"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2900274"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2394307"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq095"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11833529_97"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3390\/s18113868"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718815842"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080352"},{"key":"12","doi-asserted-by":"crossref","first-page":"1386","DOI":"10.3390\/sym11111386","article-title":"A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications","volume":"11","author":"I. Ullah","year":"2019","journal-title":"Symmetry"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4138516"},{"issue":"8","key":"15","article-title":"An energy efficient secure distributed naming service for IoT","volume":"3","author":"C. Tamizhselvan","year":"2019","journal-title":"International Journal of Advanced Studies of Scientific Research"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3763"},{"key":"17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.14569\/IJACSA.2018.090520","article-title":"Lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve","volume":"9","author":"A. Rahman","year":"2018","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"18","unstructured":"LalS.KushwahP.ID based generalized signcryption2008Cryptology ePrint Archive, Reporthttp:\/\/eprint.iacr.org"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIIS.2010.72"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.08.009"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.034"},{"issue":"11","key":"22","article-title":"A survey on ID based and certificateless generalized signcryption scheme","volume":"2","author":"D. Mishra","year":"2014","journal-title":"International Journal of Innovative Research in Advanced Engineering"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3390\/e19030121"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.3390\/math7090782"},{"key":"25","unstructured":"HuifangJ.WenbaoH.LongZ.Certificateless generalized signcryption2010Cryptology ePrint Archive, Reporthttp:\/\/eprint.iacr.org"},{"key":"26","first-page":"925","article-title":"Provable secure certificateless generalized signcryption scheme","volume":"3","author":"P. Kushwah","year":"2012","journal-title":"Technology & Applications"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9734-y"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2631950"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974381"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3578942"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718824465"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100475"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2939204"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1650"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566428"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201713900037"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184407"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/nana.2017.54"},{"key":"39","first-page":"216","article-title":"Privacy-preserving multi-party aggregate signcryption for heterogeneous systems","author":"S. Niu"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1524-z"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1319523"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0208311"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2797102"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0985-7"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0964-z"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.3390\/app9153131"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.3390\/math7080686"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.51"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8405879"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995080"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994988"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8857272.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8857272.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8857272.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T02:36:32Z","timestamp":1605753392000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/8857272\/"}},"subtitle":[],"editor":[{"given":"Fawad","family":"Zaman","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":52,"alternative-id":["8857272","8857272"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8857272","relation":{},"ISSN":["1530-8677","1530-8669"],"issn-type":[{"value":"1530-8677","type":"electronic"},{"value":"1530-8669","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,17]]}}}