The Internet of Things (IoT) plays an essential role in people's daily lives, such as healthcare, home, traffic, industry, and so on. With the increase in IoT devices, there emerge many security issues of data loss, privacy leakage, and information temper in IoT network applications. Even with the development of quantum computing, most current information systems are weak to quantum attacks with traditional cryptographic algorithms. This paper first establishes a general security model for these IoT network applications, which comprises the blockchain and a post-quantum secure identity-based signature (PQ-IDS) scheme. This model divides these IoT networks into three layers: perceptual, network, and application, which can protect data security and user privacy in the whole data-sharing process. The proposed PQ-IDS scheme is based on lattice cryptography. Bimodal Gaussian distribution and the discrete Gaussian sample algorithm are applied to construct the fundamental difficulty problem of lattice assumption. This assumption can help resist the quantum attack for information exchange among IoT devices. Meanwhile, the signature mechanism with IoT devices' identity can guarantee non-repudiation of information signatures. Then, the security proof shows that the proposed PQ-IDS can obtain the security properties of unforgeability, non-repudiation, and non-transferability. The efficiency comparisons and performance evaluations show that the proposed PQ-IDS has good efficiency and practice in IoT network applications.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11244427PMC
http://dx.doi.org/10.3390/s24134188DOI Listing

Publication Analysis

Top Keywords

iot network
12
network applications
12
proposed pq-ids
12
post-quantum secure
8
secure identity-based
8
identity-based signature
8
lattice assumption
8
internet things
8
iot
8
iot devices
8

Similar Publications

One of the most promising applications for electroencephalogram (EEG)-based brain-computer interfaces (BCIs) is motor rehabilitation through motor imagery (MI) tasks. However, current MI training requires physical attendance, while remote MI training can be applied anywhere, facilitating flexible rehabilitation. Providing remote MI training raises challenges to ensuring an accurate recognition of MI tasks by healthcare providers, in addition to managing computation and communication costs.

View Article and Find Full Text PDF

The paper presents a double-radio wireless multimedia sensor node (WMSN) with a camera on board, designed for plant proximal monitoring. Camera sensor nodes represent an effective solution to monitor the crop at the leaf or fruit scale, with details that cannot be retrieved with the same precision through satellites or unnamed aerial vehicles (UAVs). From the technological point of view, WMSNs are characterized by very different requirements, compared to standard wireless sensor nodes; in particular, the network data rate results in higher energy consumption and incompatibility with the usage of battery-powered devices.

View Article and Find Full Text PDF

The paradigms of Industry 4.0 and Industrial Internet of Things (IIoT) require functional architectures to deploy and organize hardware and software taking advantage of modern digital technologies in industrial systems. In this sense, a lot of the literature proposes and describes this type of architecture with a conceptual angle, without providing experimental validation or with scarce details about the involved equipment under real operation.

View Article and Find Full Text PDF

As proximity-aware services among devices such as sensors, IoT devices, and user equipment are expected to facilitate a wide range of new applications in the beyond 5G and 6G era, managing heterogeneous environments with diverse node capabilities becomes essential. This paper analytically models and characterizes the performance of heterogeneous random access-based wireless mutual broadcast (RA-WMB) with distinct transmit (Tx) power levels, leveraging a marked Poisson point process to account for nodes' various Tx power. In particular, this study enables the performance of RA-WMB with heterogeneous Tx power to be represented in terms of the performance of RA-WMB with a common Tx power by deriving an equivalent Tx power based on the probability distribution of heterogeneous Tx power and the path loss exponent.

View Article and Find Full Text PDF

A Review of Asynchronous Byzantine Consensus Protocols.

Sensors (Basel)

December 2024

School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing 100044, China.

Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. In blockchain systems, consensus mechanisms are a key technology for maintaining data consistency and correctness. Among the various consensus protocols, asynchronous Byzantine consensus protocols offer strong robustness as they do not rely on any network timing assumptions during design.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!