APP下载

A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

2021-12-15YongWoonHwangandImYeongLee

Computers Materials&Continua 2021年11期

Yong-Woon Hwang and Im-Yeong Lee

Department of Software Convergence in Soonchunhyang University,Asan-si,31538,Korea

Abstract:Recently,with the advancement of Information and Communications Technology (ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if data is transmitted in plain text when collecting data in an IoTcloud environment,it can be exposed to various security threats such as replay attacks and data forgery.Thus,digital signatures are required.Data integrity is ensured when a user(or a device)transmits data using a signature.In addition,the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices) in an industrial IoT environment.However,signatures based on pairing during aggregation compromise efficiency as the number of signatories increases.Aggregate signature methods(e.g.,identity-based and certificateless cryptography)have been studied.Both methods pose key escrow and key distribution problems.In order to solve these problems,the use of aggregate signatures in certificate-based cryptography is being studied,and studies to satisfy the prevention of forgery of signatures and other security problems are being conducted.In this paper,we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.In this proposed method,by providing key insulation,security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.This can be applied to create an environment in which data is collected safely and efficiently in IoT-cloud is environments.

Keywords:Internet of things;certificate-based aggregate signature;key insulation;cloud;lightweight;physical attack

1 Introduction

Recent developments in Information and Communications Technology (ICT),the Internet of Things (IoT) have facilitated industrial “smartization”;smart factories and smart industries that link the real and virtual worlds via Cyber Physical Systems (CPS).A CPS processes tasks and information of the physical world in virtual space using IoT and other networks,and continuously adapts to changes without human intervention.If a CPS is to function well,the nature of the IoT environment is important because many physical things must be connected to sensors and communication devices.In an IoT-cloud environment,data is collected from IoT devices and stored safely in the cloud,whereby legitimate users can access the cloud and check the data.It is currently mainly used in Industrial Internet of Things (IIoT) environments such as manufacturing,transportation,and energy fields,as well,as medical environments and smart homes [1-3].However,if sensors transmit plain text,data forgery and replay attacks are possible.In particular,millions of dollars worth of assets could be at risk if communications are not secured in large network systems such as IIoT environments [4].

To solve this problem,a lightweight cryptography technology is required to provide data confidentiality,and a digital signature technology that ensures the integrity of the data generated by a sensor device in an IoT environment is necessary.A sensor signs all messages and passes them (through a gateway) to the cloud as shown in Fig.1.A user verifies the signature,ensuring message integrity.In an IoT environment,users can receive safe services only when the integrity of data collected from all devices is ensured.In addition,in an environment where large-scale data is collected such as IIoT,the concept of aggregation is important to efficiently distribute data.

Figure 1:Data signing and verification process in the IoT-cloud (e.g.,smart factory)

However,among previously studied aggregate signature methods,there are many methods that create aggregate signatures using pairing operations.This is inefficient.The computational burden rises as the number of signatories increases.An early digital signature method used a Public Key Infrastructure (PKI) encryption system.This was followed by signature and aggregate signature methods employing Identity-Based Cryptography (IBC),Identity-Based Signatures (IBS),Identity-Based Aggregate Signatures (IBAS),and Certificateless Cryptography (CLC).However,both the IBC and CLC methods pose key escrow and/or key distribution problems [5-7].To solve these problems,Certificate-Based Signatures (CBS) and Certificate-Based Aggregate Signatures (CB-AS)have been proposed,and studies are being conducted to ensure they meet a number of security requirements,such as data integrity,non-repudiation,and resistance to the forgery of signatures.

In this paper,we analyze CB-AS and propose a new lightweight CB-AS scheme for IoT-cloud environments.Specifically,this proposed method is an efficient CB-AS method that provides key insulation,and the contribution of the paper is as follows:1) The signature cannot be forged by an attacker.2) In order to solve the key exposure problem due to physical attacks such as side-channel attacks,key insulation is applied to continuously update the signature keys generated in the sensor devices.3) The size of the entire signature is reduced in group environments,such as IIoT,by a gateway collecting and aggregating signed messages from multiple sensor devices.The final verifier can verify the signatures for multiple messages with one verification,and this provides integrity and non-repudiation functions for messages.4) Since it is performed using pairing-free operations in the signature generation,aggregation,and verification steps,the operation efficiency is high compared to the aggregate signature methods proposed using pairings.

The proposed scheme in this paper focuses on integrity rather than confidentiality of data.It will be applicable to a sensor device network environment that safely collects data continuously in real time in an IIoT environment that has been expanded to an IoT-cloud environment.The paper is structured as follows.Section 2 deals with related studies and explains the CBS and CB-AS constructs,security threats,and previously studied key insulation and CB-AS systems.Section 3 introduces the security requirements of Certificate-Based Key Insulated Aggregate Signatures (CBKIAS).Section 4 describes our method in detail.Section 5 analyzes the security and efficiency of the method,and Section 6 is the conclusion.

2 Background

This section describes the Elliptic Curve Discrete Logarithm Problem (ECDLP),digital signatures,and key insulation.It also reviews studies on CB-AS.

2.1 ECDLP

Elliptic curve encryption is a public key encryption method using the fact that the discrete logarithm problem on the elliptic curve is difficult.Compared to conventional public key cryptography,the same security can be obtained with fewer bits,encryption is processed at a high speed,and key management is easy because a short key is used.Therefore,it is widely used in IoT and other lightweight environments.The elliptic curve for elliptic curve encryption is a set of solutions (X,Y) of the equationy2=x3+ax+b(mod p)defined for arbitrary integers a,b.The fact that the point P=(X,Y) is on the elliptic curve means that the above equation is satisfied,and Q=x·P can be defined for any integer x for two points P,Q.Finding the solutionxis a problem of discrete logarithm elliptic curves.In other words,it is easy to find Q usingx·P in Q=x·P,but it is very difficult to infer the x value even if you know Q and P [8].

2.2 Digital Signatures

A digital signature is a method of verifying one’s identity in a network,and generally uses cryptographic technology related to Public Key Cryptography (PKC).When a message is signed with the sender’s private key and transmitted,the receiver uses the sender’s public key to verify the validity of the signature.This provides a non-repudiation function via the signed message,that can prove that a message has been transmitted from the sender and provides the signer’s authentication and message integrity.

Digital signatures started from PKC based signatures and have evolved into various types of signatures such as IBS,Certificateless Signature (CLS),and CBS,and research on signatures that aggregate many signatures into one signature is also being conducted [9-12].PKC is a security technology that utilizes public key cryptography and can provide various functions such as signing and authentication.However,since PKC uses a certificate to verify a user’s public key,there is a storage problem for the certificate and overhead for management such as distribution,verification,and revocation.

Therefore,Shamir developed an IBS.In IBS the public key is a user identifier,eliminating the certificate management overhead [13-15].However,a key escrow problem occurs because all users require private keys [16-18].

To solve this problem,Gentry et al.(2003) developed a (CBC) scheme that combined the advantages of the PKC and IBC.A user creates a public/private key pair and receives a certificate with an identity and a public key from a trusted Certification Authority (CA).The CBC certificate serves as a private (secret) key for the user.Signing and decryption are performed employing the user’s certificate and private key simultaneously.Thus,the key escrow problem caused by the Key Generation Center (KGC) issuance of keys to each IBS owner is solved,and certificate management (problematic with the earlier PKC schemes) is simplified.Additionally,public key verification overload is eliminated.There are CBS and CB-AS techniques using CBC [19-26].

2.3 Key Insulation

In signature-based methods,the private key used in signing must be absolutely secure.If this key is exposed,there are several security threats to the smart factory of Fig.1.Assuming that the attacker has exposed a key by physically attacking a sensor in the factory,the attacker can use that key to forge a message and signature from the sensor.This can trigger errors in manufacturing and the entire system could stop.This is fatal in a large,interconnected environment such as a smart factory or other IIoT.It is essential to safely manage and store the private keys,and among the various methods to do this is key insulation technology.

Key insulation was introduced by Dodis in 2002.Users update their private keys using a physically secure device termed a Helper (Fig.2) [27].Each user creates a public key,a private key,and a temporary secret key for initial signature.After that,the helper takes the user’s public key,creates key,known as an update key,that can be used for period t,and sends it to the user.With the received update key,the user updates the existing signature key with a signature key that can be used for period t.Then,the Helper issues a new key to be used during the following period,t′.The IBC,CBC,and CLS methods use key insulation methods to solve the problem of key exposure [28-31].

Figure 2:Signature key generation structure using key insulation

2.4 Certificate-Based Aggregate Signatures(CB-AS)

A CBS is a signature for a single message.The CB-AS method collects multiple messages and creates an aggregated signature.In CBS,if multiple senders transmit data,a signature is generated for each message.Thus,the number of signatures increases as the number of signatories rises,and the verifier must check all signatures.CB-AS aggregates the multiple signatures into one.Sender public keys are used for verification,but all signatures are verified together.This reduces verification and memory overheads,computing cost,and bandwidth.Many pairing-free-based CB-AS methods have been applied in IIoT environments such as smart factories [23-26].

2.4.1 CB-AS Model

Fig.3 is a diagram showing the basic structure of CB-AS.The CB-AS method features a CBS that first registers a sensor with a CA and then issues a certificate.In general,the technique features seven phases.The Setup and Certificate Generate (CertGen) phases are performed by the CA.During Setup,the public parameters and a master CA key are created.In the CertGen phase,when a user requests,a certificate corresponding to the user ID and public key is generated and transmitted.In the Key Generate (KeyGen) phase,the user (signatory) generates a public/private key pair and then a signature for messages using the certificate,the public and private keys,and his/her identity.In the Sign phase,the user signs the message and sends it to the gateway,which verifies the message and signature.Messages and signatures from multiple signatories are aggregated into one by the gateway and transmitted to cloud storage.The verifier checks all messages and the aggregated signature [23-26].

Figure 3:Structure of certificate-based aggregate signature

2.4.2 CB-AS Attack Model

The CB-AS method is vulnerable to forgery of messages and signatures.The public CB-PKC key can be authenticated via a certificate,but an attacker may substitute the public key of another user.A public key replacement attack on a CBS may forge the signature that device (A) sends to device (B) and replace the public key of device (A) (which is open for signature verification) with a public key generated by the attacker.Such an attack is possible because the substituted public key of the attacker,which can bypass verification of a signature generated using the private key of device (A),cannot be authenticated as the public key of device (A).In addition,the CA can forge the signature of device (A) using a certificate [25-27].

The security model of CB-AS must counter two types of attacks.The two models are similar to games in which competent attackers A1and A2communicate with Challenger (C) to successfully forge signatures.In the oracle model,Challenger (C) is responsible for calculating and executing a value when a user requests it.A1serves as an outsider who can arbitrarily substitute a new key for the public key of a legitimate user,but does not know the certificate or master key.A2is an attacker who can act as a malicious CA or control the CA master key,but cannot replace the public keys of users.If A1or A2want to forge signatures,the signature can be forged by repeatedly executing a number of queries with attack type 1 and 2 below.The security threats mentioned above occur not only with CB-AS,but also with CB-KIAS where key insulation is provided.When comparing CB-KIAS and CB-AS,it includes a key update phase and a signing key generation phase.

Security Attack Type I,Adversary A1

In Security Attack Type I,II,an attack is performed based on the CB-KIAS model,which provides a key insulation function.

· Setup:Challenger (C) creates a CA master public/private key and system parameters by executing this phase.

· KeyGen:The counterfeiter (attacker) sends its identity to obtain a key.Challenger (C) gets the key,creates a public keyPUiand delivers it to the attacker.

· PublicKeyReplace:The attacker can replace the user’s public key withPUi.It is not necessary to obtain the user’s private key.The attacker can repeat this phase.

· CertGen:The attacker requests authentication for(ID,PUi) and Challenger (C) sends the certificate obtained by executing CertGen to the attacker.

· Signature Key:The attacker makes a request to obtain a signing key,and Challenger (C)generates a temporary signature keyTskIDi,0and sends it to the attacker A1.

· Sign Generate (SignGen):The attacker requests the(ID,m) signature and Challenger (C)executes SignGen to obtain that signature.Then,Challenger (C) sends the signature to the counterfeiter and records the response.

It is possible to use the oracle to query Setup,KeyGen,PublicKeyReplace,CertGen,Signature Key and SignGen (depending on the competence of A1).Then the attacker (counterfeiter) can output

-AIhas never requestedID′through the Signature Key oracle.

-AIhas never requested(ID′,PUi′)through the Signature Key oracle.

-(σ′,m′,t′)is a legitimate counterfeit message and signature pair,but A1has never requestedthrough the SignGen oracle.

Definition 1.In CB-AS Attack Type I,if there is no attacker A1who can win with a nonnegligible probability within probabilistic polynomial time (PPT),it is existentially impossible to engage in forgery.

Security Attack Type II,Adversary A2

· Setup,KeyGen,CertGen,Signature Key,SignGen:Same as the setup of Attack Type I,and parameter values are send to A2.

· Helper Key:When the counterfeiter receives the Helper key query,Challenger(C) generates the Helper’s private key and public key (hsk1,hsk2,hpk1,hpk2) and sends them to the counterfeiter A2.As A2knows the CA master key,she/he can mount a forgery attack,and can execute the Setup,KeyGen,Helper Key,Signature Key,SignGen oracle queries.Then,the counterfeiter can output(ID′,PUi′,σ′,m′).

-A2has never requested anID′through the Signature Key oracle.

-(σ′,m′,t)is a valid counterfeit message and signature pair,but A2has never requestedthrough the SignGen oracle.

Definition 2.In CB-KIAS Attack Type II,it is existentially impossible to engage in forgery in the absence of an attacker A2,who can win with a non-negligible probability within probabilistic polynomial time (PPT).

2.5 Analysis of Existing CB-AS Schemes

CB-AS was first proposed by Gentry in 2003,and recently proposed CB-AS schemes have many efficient methods that do not use pairing operations.Tab.1 shows existing CBS,IBAS,and CB-AS methods that have been studied as well as the proposed method.The Li et al.[32]scheme solves the problem of key exposure due to physical attack by using a certificate-based signature using a key insulation technique.However,since it uses a pairing operation,there is a disadvantage in that the computational amount is high,and in 2017,Lu et al.[30]raised the problem that the signature could be forged by a malicious CA in the Li et al.scheme.This is because some(e.g.,l(M)rm) of the signature that contains the message is not related to the signer’s private key.Thus,a malicious CA could forge the signature by removing l(M)rmand adding l(M′)r′mwithout affecting the validity of the signature.

Table 1:Comparison of certificate-based signature,certificate-based aggregate signature,identitybased aggregate signatures schemes

Xiong et al.[22]proposed an efficient CBS scheme that does not use a pairing operation.As a feature,a key insulation technique is applied to solve the security threats that occur when the key is exposed by a physical attack.The system affords high computational efficiency in lightweight IoT environments.However,as it lacks an aggregation function,it is necessary to individually verify all data from multiple sensors.

The Reddy et al.[29]scheme and the Shen et al.[11]scheme employ identity-based aggregate signatures,but only the Reddy et al.scheme features key insulation.Since both methods use pairing,and the larger the number of signatures,the higher the amount of computation.Also,since IBS allow the KGC to create a user’s key,curiously,a key escrow issue can arise from KGC.To solve the key escrow problem,use need to create their own keys for signing.

The methods of the Chen et al.[24]scheme and the Verma et al.second method feature CB-AS.Either can be used in IoT and IIoT environments because computation is efficient (pairing is not employed).However,key insulation is not provided.Xiong et al.showed that one of the methods of Verma et al.was susceptible to public key replacement attack and signature forgery by a malicious CA.As in Attack Type I in 2.4.2,assuming that the attackerA1tries to forge a valid signature on all messagesmirepresented by users withIDiand public keysYi,in Verma et al.H0(IDi‖Yi),which is calculated during the signature process of method 1,can be removed and replaced withH0(IDi′‖Yi′).Since this does not contain the random value generated during the signing process,the attacker can easily eraseH0(IDi‖Yi)and replace it.Attack Type II is similar to Attack Type I,but in Attack Type II,an attacker can substituteH1(mi′‖IDi′‖Yi′‖par)forH1(mi‖IDi‖Yi‖par)in the signing process,and can successfully forge the signature even when the user’s secret key is not known [31].

Xiong et al.[31]proposed a second method.It is a CB-KIAS proposed to solve the signature forgery problem occurring in the Verma et al.method discussed above.This Xiong et al.method includes both the aggregation function and key insulation function required by this proposed scheme.However,since a pairing operation is used,there is a disadvantage considering the amount of operations increase according to the number of signatures when generating signatures,verifying signatures,and verifying aggregated signatures.

The goal of our proposed method is to provide overall operational efficiency by not using a pairing operation unlike the second Xiong et al.method.In addition,we will solve the problem of forged signatures due to the attacks presented in Section 2.4.2,and respond to security threats that occur when keys are exposed due to physical attacks through periodic key updates in a key insulation method.

3 Security Requirements

· Data Integrity and Reliability:It is essential to ensure the integrity and reliability of data(messages) transmitted to/from sensors in an IoT environment.In existing CB-AS systems,the gateway individually verifies data transmitted by multiple sensors,and aggregates and transmits this information.A user who wishes to check the data must verify the final aggregated signature.Such verification is essential to ensure message integrity/non-repudiation,and the reliability of devices that transmit and receive messages.

·Unforgeablity:As described in Section 2.4.2,signature forgery can occur via an A1instigated public key substitution attack or when A2employs the CA master key to create a user certificate.A1should not be able to generate a legitimate signature even via public key replacement employing a valid user identity.A2should not be able to forge a signature even if that signature is generated using both the signatory’s key and certificate.Therefore,a verifier should not be able to verify a forged signature.

· Side-channel Attack Key Exposure Prevention:Messages are signed to ensure integrity and sensor reliability.That is,the signer’s (sensor device’s) signature key should not be leaked to the outside or extracted through a public value.If an attacker can deduce or steal the signature key through a physical attack,such as a side-channel attack,the attacker can forge the signature of the generated messages.This reduces the reliability of IoT sensor devices,and an attacker can forge and transmit any number of messages through the extracted signature key value.Therefore,by applying a method such as key insulation,the signature key of the signer will be continuously updated.

4 The Proposed CB-KIAS Scheme

In this paper,we propose a certificate-based aggregate signature scheme that provides key insulation for secure data collection and processing through sensor networks in IoT-cloud environments.Fig.4 is a schematic diagram of the scenario of this proposed method.In a network environment connected to a virtual CPS space,sensors generate data,sign messages,and send them to a gateway.Each gateway serves as an aggregator that verifies,collects,and aggregates data from multiple sensors and stores the information in the cloud.A user who wants to check the aggregated data can download the information and perform a single verification.The CA initially registers each sensor and issues certificates when requested.The Helper creates and updates(partial) keys for each sensor.The proposed scheme satisfies the security requirements for signature forgery prevention and non-repudiation of signatures.Aggregate signatures based on pairing-free operations can reduce the size of signatures in storage and reduce the amount of verification computations for validators.In addition,when a sensor device generates a signature key,a key insulation method is applied to periodically update the key used for signatures.This can prevent a security threat that may occur due to the exposure of the sensor key due to a physical attack such as a side-channel attack.

Figure 4:Scenario of the proposed scheme

4.1 System Parameters

The system parameters are:

·IDi:Identifier of sensor i

·E,P:Elliptic curve on group G with prime order q,generator point of group G

·Certi:Certificate of sensor i

·MK,PCA:CA’s master private key/master public key pair

·DPKIDi,DSKIDi:Public key/private key pair of sensorIDi

·s,zi:Random values

·hSKIDi:The helper private key for sensorIDi

·udskIDi,t:A value used by sensorIDito update the signature key

·σi:The signature for the message

·TSKIDi,0:The initial temporary signature key generated by the sensor

·TSKIDi,t:The updated signature keys generated by sensorIDi

·H0(·):Cryptographic hash function

·H1(·):Cryptographic hash function

·H2(·):Cryptographic hash function

4.2 System Scenario

The eight phases of our scheme include a KeyUpdate key insulation process and the seven phases of the CB-AS listed in Section 2.4.1.

· Setup:The CA receives the security parameters and generates the public parameters,the master secret key,and the CA public key.(Step 1 of Fig.4)

· KeyGen:Each sensor generates a public/private key pair using the public parameters and random values,and requests a certificate from the CA.(Step 2 of Fig.4)

· CertGen:The CA generates a certificateCertIDicorresponding to IDiusing IDi,DPKIDi,a public parameter,and the master secret key of the CA.The certificate is transmitted to the sensor.The CA creates a random value and sends it to the Helper.(Step 3 of in Fig.4)

· KeyUpdate:Initially the helper creates a temporary valuehSKIDifor signature generation and passes it to the sensor,and the sensor creates a temporary keyTSKIDi,0that can be used for signing.The Helper creates an updated valueudskIDi,tand sends it to the sensor,which then updatesTSKIDi,0toTSKIDi,tfor signature using the public hash functions and update value received from the Helper.(Step 4 of Fig.4)

· Sign:The sensor signs the message using theIDi,DPKIDi,CertIDiand signature keyTSKIDi,tthen sends the message and signature to the gateway.(Step 5 of Fig.4)

· Signature Verify:The gateway verifies the signature of the received messages usingIDi,DPKIDiand certificateCertIDifor each sensor device.(Step 6 of Fig.4)

· Aggregate Signature:In the proposed method,the gateway serves as both a validator and aggregator.Messages and signatures (m1,...,mn,σ1,...,σn)collected from multiple sensor devices are verified with(ID1,...,IDi,DPKID1,...,DPKIDi,CertID1,...,CertIDi) then aggregated through the gateway,and the aggregated data is transmitted to cloud storage.After aggregation,n signatures become one signature,reducing signature size.A verifier can check n messages in a single step.(Step 7 of Fig.4)

· Aggregate Signature Verify:A user who wants to check the aggregated data can verify the integrity of the message collected from each sensor device by retrieving the aggregated data(m1,...,mn,σ)from the cloud storage as a final verifier and performing verification with(ID1,...,IDi,DPKID1,..,DPKIDi,CertID1,...,CertIDi).(Step 8 of Fig.4).

4.3 Description of the Proposed Scheme

4.3.1 Setup Phase

Setup is performed by entering the security parameter K into the CA,and the public keyPKCA=MK·Pis generated as shown in Eq.(1) after selecting a random values∈Z*q.Then,the public parameterPPis created as shown in Eq.(2).Sincesis used as the master key value,it is kept secret while PKCAandPPare disclosed.

4.3.2 KeyGen Phase

SensorIDiselects a random valuexIDi∈Z*qand generates a public/private key pair(DPKIDi,DSKIDi) as shown in Eq.(3).Then,a certificate is requested by sending IDiandDPKIDito the CA.

4.3.3 CertGen Phase

The CA receives IDiandDPKIDifrom the sensor and generates the certificateCertIDicorresponding to the sensor device IDiusing thePPandMKas follows.

The CA transmits the certificate to the sensor and sends the registered sensor information to the Helper via a secure channel.

4.3.4 Key Update Phase

The KeyUpdate phase is divided into three steps.First,when the Helper sends a temporary value for signing key generation to the sensor device,the device creates a temporary key for signing.The second step is for the Helper to generate and transmit an update valueudskIDi,tthat the sensor uses to update the signature key of the sensor device.Finally,the sensor takes the received update value and updates the signature key,TSKIDi,tusing it.Eq.(7) shows how the sensor generates temporary keyTSKIDi,0for signing,assuming that it was initially sentfrom the Helper to create the signature key.

Helper key update step:The Helper generates the update valueudskIDi,temploying the user information received from the CA and transmits it to the sensor.

Sensor signature key update:The sensor receivesudskIDi,tfrom the Helper and can update the existing temporary signature keyTSKIDi,t-1toTSKIDi,tas follows.(TheTSKIDi,tkey can be used for time t.)

4.3.5 Sign Phase

The sensor signs messagemi∈{0,1}*using the signature keyTSKIDi,tand itsIDi,DPKIDi,andCertIDiand sends the result to the gateway.

Step 1.The sensor device calculatesUi=ri·Pby selecting a random valueri∈Z*q.

Step 2.The value required for signature is generated as follows and the signature is output.

4.3.6 Signature Verify Phase

The gateway receives signed messages from sensors and verifies the signatures usingIDi,DPKIDi,andCertIDias shown in Eq.(13).If the criterion is met,the message is regarded as legitimate,and if the criterion is not met,it is not.

4.3.7 Aggregate Signature Phase

When messages are received from multiple sensors,the gateway performs verification,and then aggregates messages with valid signatures.Signed messages received from n sensors are collected under one signature.Aggregation can be expressed as in Eq.(14),whereWis the signature of message (m1,...,mn).

4.3.8 Aggregate Signature Verify Phase

Users who wish to check aggregated messages download them from the cloud.Then the users verify the validity of the aggregated signatureWusingcertificates(CertID1,...,CertIDi)and the aggregated messages(m1,...,mn).The user can verify the validity of the signatures of multiple messages with a single signature verification,and can therefore verify the integrity of the messages collected from all sensor devices.Verification proceeds using Eq.(15).

5 Analysis of Proposed Scheme

In this section,we will identify whether the proposed method meets the data integrity,forgery resistance,and key leakage resilience requirements from Section 3.

5.1 Security Analysis

·Data Integrity and Reliability:Verification is essential to ensure message integrity,reliability,and non-repudiation.In this paper,the signatureσi=(Ui,Wi,Zi)generated by each sensor device uses a certificate value,the device’s private key,and a public key.VerifyingWi·Pincludes the operationwhich verifies message integrity.In addition,the verifier can know that the data has been sent from sensorIDiby verifyingσiusing the public key of the CA,the public key of the sensor device,and the public key of the Helper,as well as public parameters and the message.Thus,it can be seen that the message has not been modified during transmission.

· Unforgeability:In a CB-PKC signature protocol,an attack on unforgeability can occur.The types of attacks can be divided into an attack by an attacker A1,capable of public key replacement,and an attack by an attacker A2,a malicious CA.A1has the ability to replace the public keys of other users with their own generated keys.Due to the safety of ECDLP,private keys corresponding to users’public keys cannot be determined,but only public keys need be replaced to bypass validation.Public key replacement attacks often occur in certificateless methods where there is no certificate that can authenticate the public key of a sensor device,e.g.,the signer.However,even if there are certificates,attacker A1can perform a public key replacement attack by creating a new private key/public key pair like the attack model in Section 2.4.2.This is very difficult because it has to be performed within the polynomial time,and because the public key is usually authenticated by a CA.However,it was analyzed that Verma et al.scheme 2 is vulnerable to a public key exchange attack by Xiong et al.This attack modifies the operation of the signature value regardless of the issued certificate,so that the signature can be forged,and the verifier can still process it as valid.In our proposed method,the form of individual signature isσi=(Ui,Wi,Zi),and the signatureσi′=(Ui′,Wi′,Zi′)that could create a valid message cannot be generated using the forged public keyby attacker A1.The signature generation formula for the message isWi=dID+TSKIDi,t+riH2(mi,t,IDi,Ui,DPKIDi),and the attacker A1cannot create a legitimateWibecause theTSKIDi,tare unknown.The signature verification formula (Eq.(13)) is calculated using the public key of CA,the public key of the sensor device,the public key of the Helper,other public parameters,and the message.It is impossible for attacker A1to forge the signature by replacing it with the public key of another device without CA assistance.

Attacker A2is a malicious CA and has the ability to know all the certificates of registered sensor devices because it knows MK.Because A2does not have the ability to replace public keys,if A2wants to forge a signature of a sensor device,it will try to generate a signature with the value of the sensor’s certificate.The signature generation formula for a message isWi=dID+TSKIDi,t+riH2(mi,t,IDi,Ui,DPKIDi).Since the signature keyTSKIDi,tgenerated by the sensor device is used to generate the signature,the CA cannot forge the signature with onlyZi,anddID,and cannot extractTSKIDi,t.The signer’s signature cannot be forged using only external public parameters,including in the CA A2scenario.In particular,in the proposed scheme,the signature key used must includeudskIDi,t,created through the Helper,the previous temporary key valueTSKIDi,0of the sensor device,and the certificate.Therefore,a malicious CA cannot forge the sensor device’s signature using the MK.

·Key Exposure Resilience:In our proposed method,the sensor devices initially register with the CA,receive a certificate,and receivehSKIDiH1from the Helper in order to generate keys.Then the devices create temporary keysTSKIDi,0for signing.Next,udskIDi,tis received from the Hepler in the KeyUpdate Phase,and a keyTSKIDi,t,that can be used to sign for a period of time t,is generated and used when signing.TSKIDi,tincludes the sensor device identifierIDi,the device public key/private key pair(DPKIDi,DSKIDi),the Helper’s private keyhSKIDi,andZifrom the certificate.At this point,even ifTSKIDi,tis exposed by a physical attack,each sensor device can update its signature key through the Helper and use the new key for signing.Later,when a verifier checks the signature,theTSKIDi,tis verified with the public keyDPKIDiof the sensor device and the public key of the Helper.Since the period t in which the signature can be used is included as a parameter,when an attacker who obtained the previousTSKIDi,tsigns with it the verifier will be unable to verify.Therefore,it is impossible to perform various attacks such as signature forgery or masquerade attacks by obtaining the signature keyTSKIDi,tthrough physical attack.

5.2 Efficiency

An IoT environment requires efficient computation.In a network environment in which many sensor devices participate in communications,the system is required to work without problems using low-performance devices with either Elliptic Curve Cryptography (ECC) or paring-free based lightweight cryptographic operations rather than heavy cryptographic operations using on Rivest-Shamir-Adleman (RSA) and pairing operations.In the aggregation process,as the number of messages and signatures increases,the total time for signature,aggregation,and verification increases in direct proportion.In this proposed method,pairing operations are not used.Compared to other pairing-free methods,ECC-based elliptic curve addition and multiplication operations are efficiently applied to reduce the total operation time,and the amount of calculation is more efficient than the pairing operations applied in the existing Xiong et al.[31]scheme.In addition,compared to the Chen et al.and Reddy et al.methods,which do not use pairing operations,as shown in Tab.2,the computational efficiency is high,and the computational amount is similar to the Verma et al.methods.For the simulation environment of this proposed method and the existing methods,Windows 10 was used,running on an Intel i5-4690 processor with 3.50 GHz clock rate and 8 GB of memory.The ECC implementation used a Koblitz elliptic curvey2=x3+ax+b(modp)with a=1 and b=1,with a 163-bit random prime defined inF2163.The execution timeTsmof the scalar multiplication operation in ECC was 0.431 ms,and the addition operationTsabetween points in ECC was 0.017 ms.In addition,the hash operation execution timeHwas 0.079 ms,the scalar exponential operation execution timeTsewas 4.416 ms,and finally,the pairing operation p was 20.225 ms.Tab.2 compares the efficiency of other recently proposed CB-AS methods with the proposed method,and Fig.5 is a graph of the expected execution times.As shown in Fig.5,this proposed method has a higher computational efficiency than Verma et al.schemes 1 and 2,which do not use pairing operations but also don’t provide key insulation.In addition,compared to the Xiong et al.scheme,which is an aggregate signature method that provides key insulation,the amount of computation is reduced,thereby increasing the efficiency of the overall computational amount in the proposed scheme.

Table 2:Security and efficiency analysis of existing schemes and proposed scheme

Figure 5:Comparison of total computation time between the proposed scheme and existing schemes

6 Conclusion

The proposed scheme is a certificate-based aggregate signature scheme that provides key insulation for secure and efficient data collection and provision in IoT-cloud environments.As a feature of this proposed scheme,signatures cannot be forged by an attacker,and the signature keys generated in the sensor devices are continuously updated by applying a key insulation technique to solve the key exposure problem caused by physical attacks such as side-channels attacks.In addition,the aggregate signature function allows the signatures of messages received from multiple sensor devices to be aggregated into one signature,thereby reducing the total size of the signature.Additionally,the final verifier can verify the signature of multiple messages with a single verification.This provides integrity and reliability for messages,and can be used in environments such as IIoT.Finally,since it is performed using pairing-free operations in the signature generation,aggregation,and verification phases,the operation efficiency is high compared to CB-AS methods proposed using pairings (Tab.2).

For future research,it is necessary to study signcryption that can add data encryption for the confidentiality of data transmitted in the IoT environment.In particular,research on weight reduction to reduce the amount of computations performed in each phase for efficient communication between IoT devices should also be conducted.

Funding Statement:This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1085718) and was supported by the Soonchunhyang University Research Fund.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.