{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:45:23Z","timestamp":1773161123492,"version":"3.50.1"},"reference-count":20,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,17]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The information transmitted in IoT is susceptible to affect the user\u2019s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and then encrypt it. Signcryption is a technique where the signature and the encryption are performed in a single round. The current Signcryption system uses traditional cryptographic approaches that are overloaded for IoT, as it consists of resource-constrained devices and uses the weak session key to encrypt the data. We propose a hybrid Signcryption scheme that employs PRESENT, a lightweight block cipher algorithm to encrypt the data, and the session key is encrypted by ECC. The time taken to signcrypt the proposed Signcryption is better when compared to current Signcryption techniques, as it deploys lightweight cryptography techniques that are devoted to resource-constrained devices.<\/jats:p>","DOI":"10.1515\/comp-2020-0105","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T22:06:44Z","timestamp":1624399604000},"page":"391-398","source":"Crossref","is-referenced-by-count":7,"title":["Hybrid lightweight Signcryption scheme for IoT"],"prefix":"10.1515","volume":"11","author":[{"given":"M.","family":"Sruthi","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore institute of Technology , Vellore , India"}]},{"given":"Rajkumar","family":"Rajasekaran","sequence":"additional","affiliation":[{"name":"Department of Data Analytics, Vellore institute of Technology , Vellore , India"}]}],"member":"374","published-online":{"date-parts":[[2021,6,17]]},"reference":[{"key":"2022020121510252963_j_comp-2020-0105_ref_001","doi-asserted-by":"crossref","unstructured":"W. J. Buchanan , S. Li , and R. Asif , \u201cLightweight cryptography methods,\u201d J. Cyber Sec.Technol, vol. 1, no. 3\u20134, pp. 187\u2013201, 2017.","DOI":"10.1080\/23742917.2017.1384917"},{"key":"2022020121510252963_j_comp-2020-0105_ref_002","doi-asserted-by":"crossref","unstructured":"A. Bogdanov , L. R. Knudsen , G. Leander , C. Paar , A. Poschmann , M. J. Robshaw , et al., \u201cPRESENT: An ultra-lightweight block cipher,\u201d International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg: Springer, 2007, September, pp. 450\u2013466.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"2022020121510252963_j_comp-2020-0105_ref_003","doi-asserted-by":"crossref","unstructured":"A. V. Mota , S. Azam , B. Shanmugam , K. C. Yeo , and K. Kannoorpatti , \u201cComparative analysis of different techniques of encryption for secured data transmission,\u201d 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India: IEEE, 2017, September, pp. 231\u2013237.","DOI":"10.1109\/ICPCSI.2017.8392158"},{"key":"2022020121510252963_j_comp-2020-0105_ref_004","doi-asserted-by":"crossref","unstructured":"M. Bafandehkar , S. M. Yasin , R. Mahmod , and Z. M. Hanapi , \u201cComparison of ECC and RSA algorithm in resource constrained devices,\u201d IT Convergence and Security (ICITCS), 2013 International Conference on, Macao: IEEE, 2013, December, pp. 1\u20133.","DOI":"10.1109\/ICITCS.2013.6717816"},{"key":"2022020121510252963_j_comp-2020-0105_ref_005","doi-asserted-by":"crossref","unstructured":"C. Sharma , \u201cPerformance analysis of ECC and RSA for securing CoAP-based remote health monitoring system,\u201d Ambient Communications and Computer Systems, Singapore: Springer, 2018, pp. 615\u2013628.","DOI":"10.1007\/978-981-10-7386-1_52"},{"key":"2022020121510252963_j_comp-2020-0105_ref_006","unstructured":"D. Mahto and D. K. Yadav , \u201cRSA and ECC: A comparative analysis,\u201d Int. J. Appl. Eng. Res., vol. 12, no. 19. pp. 9053\u20139061, 2017."},{"key":"2022020121510252963_j_comp-2020-0105_ref_007","doi-asserted-by":"crossref","unstructured":"G. V. S. Raju and R. Akbani , \u201cElliptic curve cryptosystem and its applications,\u201d Systems, Man and Cybernetics, 2003. IEEE International Conference on, vol. 2, Washington, DC, USA: IEEE, 2003, October, pp. 1540\u20131543.","DOI":"10.1109\/ICSMC.2003.1244630"},{"key":"2022020121510252963_j_comp-2020-0105_ref_008","doi-asserted-by":"crossref","unstructured":"M. A. Khan and K. Salah , \u201cIoT security: Review, blockchain solutions, and open challenges,\u201d Future Gene. Comput. Syst., vol. 82, pp. 395\u2013411, 2018.","DOI":"10.1016\/j.future.2017.11.022"},{"key":"2022020121510252963_j_comp-2020-0105_ref_009","doi-asserted-by":"crossref","unstructured":"H. Hellaoui , M. Koudil , and A. Bouabdallah , \u201cEnergy-efficient mechanisms in security of the internet of things: A survey,\u201d Comput. Netw., vol. 127, pp. 173\u2013189, 2017.","DOI":"10.1016\/j.comnet.2017.08.006"},{"key":"2022020121510252963_j_comp-2020-0105_ref_010","doi-asserted-by":"crossref","unstructured":"Y. Zheng , \u201cDigital signcryption or how to achieve cost (signature & encryption) \u226a cost (signature) + cost (encryption),\u201d Adv. Crypto\u2009\u2013\u2009Crypto\u201997, pp. 165\u2013179, 1997.","DOI":"10.1007\/BFb0052234"},{"key":"2022020121510252963_j_comp-2020-0105_ref_011","doi-asserted-by":"crossref","unstructured":"P. Y. Ting , J. L. Tsai , and T. S. Wu , \u201cSigncryption method suitable for low-power IoT devices in a wireless sensor network,\u201d IEEE Syst. J., vol. 12, pp. 2385\u20132394, 2018.","DOI":"10.1109\/JSYST.2017.2730580"},{"key":"2022020121510252963_j_comp-2020-0105_ref_012","unstructured":"X. Zhou , Z. Jin , Y. Fu , H. Zhou , and L. Qin , \u201cShort signcryption scheme for the Internet of Things,\u201d Informatica, vol. 35, no. 4, pp. 521\u2013530, 2011."},{"key":"2022020121510252963_j_comp-2020-0105_ref_013","doi-asserted-by":"crossref","unstructured":"M. Luo , M. Tu , and J. Xu , \u201cA security communication model based on certificateless online\/offline signcryption for Internet of Things,\u201d Sec. Commun. Netw., vol. 7, no. 10. pp. 1560\u20131569, 2014.","DOI":"10.1002\/sec.836"},{"key":"2022020121510252963_j_comp-2020-0105_ref_014","doi-asserted-by":"crossref","unstructured":"W. Shi , N. Kumar , P. Gong , N. Chilamkurti , and H. Chang , \u201cOn the security of a certificateless online\/offline signcryption for Internet of Things,\u201d Peer Peer Netw. Appl., vol. 8, no. 5. pp. 881\u2013885, 2015.","DOI":"10.1007\/s12083-014-0249-3"},{"key":"2022020121510252963_j_comp-2020-0105_ref_015","doi-asserted-by":"crossref","unstructured":"L. Malina , J. Hajny , R. Fujdiak , and J. Hosek , \u201cOn perspective of security and privacy-preserving solutions in the internet of things,\u201d Comput. Netw., vol. 102, pp. 83\u201395, 2016.","DOI":"10.1016\/j.comnet.2016.03.011"},{"key":"2022020121510252963_j_comp-2020-0105_ref_016","doi-asserted-by":"crossref","unstructured":"K. T. Nguyen , N. Oualha , and M. Laurent , \u201cLightweight certificateless and provably-secure signcryptosystem for the internet of things,\u201d In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, vol. 1, Helsinki, Finland: IEEE, 2015, August, pp. 467\u2013474.","DOI":"10.1109\/Trustcom.2015.408"},{"key":"2022020121510252963_j_comp-2020-0105_ref_017","unstructured":"M. Toorani and A. A. Beheshti , \u201cCryptanalysis of an elliptic curve-based signcryption scheme. arXiv preprint arXiv:1004.3521,\u201d 2010."},{"key":"2022020121510252963_j_comp-2020-0105_ref_018","doi-asserted-by":"crossref","unstructured":"Y. Han , X. Yang , and Y. Hu , \u201cSigncryption based on elliptic curve and its multi-party schemes,\u201d In: Proceedings of the 3rd International Conference on Information Security, Shanghai, China: ACM, 2004, November, pp. 216\u2013217.","DOI":"10.1145\/1046290.1046336"},{"key":"2022020121510252963_j_comp-2020-0105_ref_019","doi-asserted-by":"crossref","unstructured":"Y. Shi , J. Han , X. Wang , J. Gao , and H. Fan , \u201cAn obfuscatable aggregatable signcryption scheme for unattended devices in IoT systems,\u201d IEEE Inter. Things J., vol. 4, pp. 1067\u20131081, 2017.","DOI":"10.1109\/JIOT.2017.2677977"},{"key":"2022020121510252963_j_comp-2020-0105_ref_020","doi-asserted-by":"crossref","unstructured":"F. Li and P. Xiong , \u201cPractical secure communication for integrating wireless sensor networks into the internet of things,\u201d IEEE Sensors J., vol. 13, no. 10. pp. 3677\u20133684, 2013.","DOI":"10.1109\/JSEN.2013.2262271"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0105\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0105\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T11:40:06Z","timestamp":1725277206000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0105\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1,13]]},"published-print":{"date-parts":[[2021,1,1]]}},"alternative-id":["10.1515\/comp-2020-0105"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0105","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}