Abstract
Internet of Things (IoT) techniques have been employed in many areas, e.g., vehicles, smart home, and medicine. Among the applications of IoTs, the Internet of Vehicles (IoV) is one of the most popular techniques. IoVs are protected by public key cryptographic systems, such as RSA and ECC. However, such systems are vulnerable to quantum computer attacks. Thus, we improve the security of IoV-based post-quantum signatures, which can resist quantum computer attacks. The key operations are divisions in a finite field. Hence, we improve the security of IoV-based post-quantum signatures with division by employing systolic architectures. We propose a systolic architecture for computing division in composite fields. After that, we improve the IoT security-based post-quantum signatures with systolic divisions. We test and verify our design on a Field-Programmable Gate Array (FPGA); the experimental results confirm our estimates. Furthermore, the optimized method proposed can be further applied to various applications like solving system of linear equations and cryptographic applications for IoT security.
- [1] . 2018. Consumer acceptance of Internet of Things (IoT): Smart home context. Journal of Computer Information Systems 36 (2018), 1–11.Google Scholar
- [2] . 2018. On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36, 6 (2018), 25–35.Google Scholar
Digital Library
- [3] . 2018. Social Internet of Vehicles: Architecture and enabling technologies. Computers & Electrical Engineering 69 (2018), 68–84.Google Scholar
Cross Ref
- [4] . 2009. Post-quantum cryptography: Lattice signatures. Computing 85, 1–2 (2009), 105–125.Google Scholar
Digital Library
- [5] . 2017. Hash-based signatures: State of play. IEEE Security & Privacy 15, 4 (2017), 37–43.Google Scholar
Digital Library
- [6] . 2005. A class of unidirectional bit serial systolic architectures for multiplicative inversion and division over GF(2m). IEEE Transactions on Computers 54, 3 (
March 2005), 370–380. Google ScholarDigital Library
- [7] . 2017. Current state of multivariate cryptography. IEEE Security & Privacy 15, 4 (2017), 28–36.Google Scholar
Digital Library
- [8] . 1994. Fast inverters and dividers for finite field GF(2m). In 1994 IEEE Asia-Pacific Conference on Circuits and Systems, 1994 (APCCAS’94).206 –211. Google Scholar
Cross Ref
- [9] . 2000. Novel iterative division algorithm over GF(2m) and its semi-systolic VLSI realization. In Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems, 2000, Vol. 1. 280–283. Google Scholar
Cross Ref
- [10] . 2019. Leveraging utilization as performance metric for CDN enabled energy efficient internet of things. Measurement 147 (2019), 106814. Google Scholar
Cross Ref
- [11] . 2018. Lightweight RFID protocol for medical privacy protection in IoT. IEEE Transactions on Industrial Informatics 14, 4 (2018), 1656–1665.Google Scholar
Cross Ref
- [12] . 2018. Recent patient health monitoring platforms incorporating Internet of Things-enabled smart devices. International Neurourology Journal 22, Suppl 2 (2018), S76–82.Google Scholar
Cross Ref
- [13] . 2017. Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Transactions on Consumer Electronics 63, 2 (2017), 200–207.Google Scholar
Digital Library
- [14] . 2017. Efficient spatial keyword query processing in the internet of industrial vehicles. Mobile Networks & Applications 23, 6 (2017), 1–15.Google Scholar
- [15] . 2015. Fully secure fuzzy identity-based encryption for secure IoT communications. Computer Standards & Interfaces 44 (2015), 1–18.Google Scholar
- [16] . 2020. Implementation of a reliability test protocol for a multimeasurement sensor dedicated to industrial applications of the internet of things. Measurement 152 (2020), 107312. Google Scholar
Cross Ref
- [17] . 2017. Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications. IEEE Transactions on Wireless Communications 16, 11 (2017), 7574–7589.Google Scholar
Cross Ref
- [18] . 2017. Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors. Journal of Supercomputing 74, 2 (2017), 1–26.Google Scholar
- [19] . 2018. Particle swarm optimization tuned cascade control system in an internet of things (IoT) environment. Measurement 117 (2018), 80–89. Google Scholar
Cross Ref
- [20] . 2017. Code-based cryptography: State of the art and perspectives. IEEE Security & Privacy 15, 4 (2017), 44–50.Google Scholar
Digital Library
- [21] . 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production 140 (2017), 1454–1464.Google Scholar
Cross Ref
- [22] . 2017. Post-quantum cryptography. Nature 549, 7671 (2017), 188.Google Scholar
- [23] . 1993. A systolic architecture for computing inverses and divisions in finite fields GF(2m). IEEE Transactions on Computers 42, 9 (
Sep. 1993), 1141–1146. Google ScholarDigital Library
- [24] . 2018. Internet of Vehicles: Sensing-aided transportation information collection and diffusion. IEEE Transactions on Vehicular Technology 67, 5 (2018), 3813–3825.Google Scholar
Cross Ref
- [25] . 2018. Offloading in Internet of Vehicles: A fog-enabled real-time traffic management system. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4568–4578.Google Scholar
Cross Ref
- [26] . 2002. An ASIC implementation of the AES SBoxes. In Topics in Cryptology-CT-RSA 2002. 29–52.Google Scholar
- [27] . 2004. High-speed, low-complexity systolic designs of novel iterative division algorithms in GF(2m). IEEE Transactions on Computers 53, 3 (
March 2004), 375–380. Google ScholarDigital Library
- [28] . 2020. Data transmission method for sensor devices in Internet of Things based on multivariate analysis. Measurement (2020), 107536. Google Scholar
Cross Ref
- [29] . 2003. New systolic architectures for inversion and division in GF(2m). IEEE Transactions on Computers 52, 11 (
Nov. 2003), 1514–1519. Google ScholarDigital Library
- [30] . 2017. Lightweight break-glass access control system for healthcare Internet-of-Things. IEEE Transactions on Industrial Informatics PP, 99 (2017), 1–1.Google Scholar
- [31] . 2020. Challenges and recommended technologies for the industrial Internet of Things: A comprehensive review. Measurement 151 (2020), 107198. Google Scholar
Cross Ref
- [32] . 2019. Physical unclonable function-based key sharing via machine leaning for IoT security. IEEE Transactions on Industrial Electronics PP, 99 (2019), 1–1.Google Scholar
- [33] . 2019. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Transactions on Industrial Informatics 15 (2019), 5099–5108.Google Scholar
- [34] . 2017. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine 55, 1 (2017), 26–33.Google Scholar
Digital Library
Index Terms
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions
Recommendations
Side-channel security analysis of UOV signature for cloud-based Internet of Things
AbstractAmong Internet of Things (IoTs), cloud-based IoTs help retain the confidentiality of both device-to-cloud and cloud-to-device messages by setting up individual identities and credentials for each IoT devices. As recently been ...
Highlights- The first study to apply differential power analysis in security analyzes of UOV signature.
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityRecent work, including ZKBoo, ZKB++, and Ligero, has developed efficient non-interactive zero-knowledge proofs of knowledge (NIZKPoKs) for Boolean circuits based on symmetric-key primitives alone, using the "MPC-in-the-head" paradigm of Ishai et al. We ...
Post-quantum secure identity-based signature achieving forward secrecy
AbstractIdentity-based cryptography (IBC) has gained significant attention over the years by enabling authentication of public key of a party without relying on certificates. Since the discovery of IBC, we have witnessed several ID-based ...






Comments