{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:04:49Z","timestamp":1760144689601,"version":"build-2065373602"},"reference-count":66,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Prince Sultan University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication. Traditional schemes are based on the main mathematical operations, including pairing, pairing-based scalar multiplication, bilinear pairing, exponential operations, elliptic curve scalar multiplication, and point multiplication operations. These traditional operands are cost-intensive and require high computing power and bandwidth overload, thus affecting efficiency. Due to the cost-intensive nature and high resource requirements, traditional approaches are not feasible and are unsuitable for resource-limited IoT devices. Furthermore, the lack of essential security attributes in traditional schemes, such as unforgeability, public verifiability, non-repudiation, forward secrecy, and resistance to denial-of-service attacks, puts data security at high risk. To overcome these challenges, we have introduced a novel signcryption algorithm based on hyperelliptic curve divisor multiplication, which is much faster than other traditional mathematical operations. Hence, the proposed methodology is based on a hyperelliptic curve, due to which it has enhanced security with smaller key sizes that reduce computational complexity by 38.16% and communication complexity by 62.5%, providing a well-balanced solution by utilizing few resources while meeting the security and efficiency requirements of resource-constrained devices. The proposed strategy also involves formal security validation, which provides confidence for the proposed methodology in practical implementations.<\/jats:p>","DOI":"10.3390\/info15050282","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T11:31:52Z","timestamp":1715772712000},"page":"282","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6550-7618","authenticated-orcid":false,"given":"Junaid","family":"Khan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9662-0532","authenticated-orcid":false,"given":"Congxu","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7911-5793","authenticated-orcid":false,"given":"Wajid","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6423-9809","authenticated-orcid":false,"given":"Muhammad","family":"Asim","sequence":"additional","affiliation":[{"name":"EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia"},{"name":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6907-2318","authenticated-orcid":false,"given":"Sadique","family":"Ahmad","sequence":"additional","affiliation":[{"name":"EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100626","DOI":"10.1016\/j.iot.2022.100626","article-title":"An overview of IoT architectures, technologies, and existing open-source projects","volume":"20","author":"Campos","year":"2022","journal-title":"Internet Things"},{"key":"ref_2","first-page":"1","article-title":"Internet of things security: Challenges and key issues","volume":"2021","author":"Azrour","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","article-title":"A comprehensive study of DDoS attacks over IoT network and their countermeasures","volume":"127","author":"Kumari","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_4","unstructured":"Ansar, S.A., Arya, S., Aggrawal, S., Saxena, S., Kushwaha, A., and Pathak, P.C. (2023). Computer Vision and Robotics: Proceedings of CVR 2022, Springer."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Al-Shareeda, M.A., Manickam, S., Laghari, S.A., and Jaisan, A. (2022). Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS\/GEM communications. Sustainability, 14.","DOI":"10.3390\/su142315900"},{"key":"ref_6","unstructured":"Bout, E. (2022). Denial-of-Sleep Attacks on IoT Networks. [Doctoral Dissertation, Universit\u00e9 de Lille]."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Lightbody, D., Ngo, D.M., Temko, A., Murphy, C.C., and Popovici, E. (2023). Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection. Future Internet, 15.","DOI":"10.3390\/fi15050187"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Alfalouji, Q., Schranz, T., K\u00fcmpel, A., Schraven, M., Storek, T., Gross, S., Monti, A., M\u00fcller, D., and Schweiger, G. (2022). IoT Middleware Platforms for Smart Energy Systems: An Empirical Expert Survey. Buildings, 12.","DOI":"10.3390\/buildings12050526"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2997","DOI":"10.1016\/j.matpr.2021.07.092","article-title":"A study on network routing attacks in IoT","volume":"80","author":"Mali","year":"2023","journal-title":"Mater. Today Proc."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hasan, A., Khan, M.A., Shabir, B., Munir, A., Malik, A.W., Anwar, Z., and Ahmad, J. (2021). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks\/Internet of Things. Appl. Sci., 12.","DOI":"10.3390\/app122211442"},{"key":"ref_11","first-page":"1080","article-title":"Blackhole attacks in internet of things networks: A review","volume":"30","author":"Kamis","year":"2023","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"7081","DOI":"10.1007\/s11227-019-03137-5","article-title":"Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication","volume":"76","author":"Mabodi","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tatar, E.E., and Dener, M. (2021, January 15\u201317). Wormhole Attacks in IoT Based Networks. Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey.","DOI":"10.1109\/UBMK52708.2021.9558996"},{"key":"ref_14","first-page":"1529","article-title":"A Novel Approach to Prevention of Hello Flood Attack in IoT Using Machine Learning Algorithm","volume":"9","author":"Alhan","year":"2022","journal-title":"El-Cezeri"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zrelli, A., Nakkach, C., and Ezzedine, T. (2022, January 19\u201322). Cyber-security for IoT applications based on ANN algorithm. Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China.","DOI":"10.1109\/ISNCC55209.2022.9851715"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kim, M., and Suh, T. (2021). Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices. Sensors, 21.","DOI":"10.3390\/s21248207"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"103126","DOI":"10.1016\/j.advengsoft.2022.103126","article-title":"Detection and prevention of man-in-the-middle attack in iot network using regression modeling","volume":"169","author":"Sivasankari","year":"2022","journal-title":"Adv. Eng. Softw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chataut, R., Phoummalayvane, A., and Akl, R. (2023). Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0. Sensors, 23.","DOI":"10.20944\/preprints202306.0002.v1"},{"key":"ref_19","first-page":"665","article-title":"An in-depth exam of iot, iot core components, iot layers, and attack types","volume":"28","author":"Yildirim","year":"2021","journal-title":"Avrupa Bilim ve Teknoloji Dergisi"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"11","DOI":"10.4236\/jcc.2020.84002","article-title":"An analysis of cybersecurity attacks against internet of things and security solutions","volume":"8","author":"Islam","year":"2020","journal-title":"J. Comput. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.iotcps.2023.04.002","article-title":"Ethical hacking for IoT: Security issues, challenges, solutions and recommendations","volume":"3","author":"Yaacoub","year":"2023","journal-title":"Internet Things Cyber-Phys. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Taherdoost, H. (2023). Security and Internet of Things: Benefits, Challenges, and Future Perspectives. Electronics, 12.","DOI":"10.3390\/electronics12081901"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e3292","DOI":"10.1002\/ett.3292","article-title":"A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments","volume":"30","author":"Kumar","year":"2019","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ali, W., Zhu, C., Latif, R., Asim, M., and Tariq, M.U. (2023). Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System. Entropy, 25.","DOI":"10.3390\/e25050787"},{"key":"ref_25","unstructured":"Zheng, Y. (1997). Advances in Cryptology\u2014CRYPTO\u201997, Proceedings of the 17th Annual International Cryptology Conference, Santa Barbara, CA, USA, 17\u201321 August 1997, Springer."},{"key":"ref_26","first-page":"26","article-title":"A review of elliptic curve based signcryption schemes","volume":"102","author":"Singh","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2050233","DOI":"10.1142\/S0218127420502338","article-title":"An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem","volume":"30","author":"Ye","year":"2020","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_28","unstructured":"Medaglia, C.M., and Serbanati, A. (2010). The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications, Springer."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Waheed, A., Iqbal, J., Din, N., Islam, S.U., Umar, A.I., and Amin, N.U. (2019). Improved cryptanalysis of provable certificateless generalized signcryption. Int. J. Adv. Comput. Sci. Appl., 10.","DOI":"10.14569\/IJACSA.2019.0100475"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S1363-4127(03)00308-X","article-title":"A comparison between traditional public key infrastructures and identity-based cryptography","volume":"8","author":"Paterson","year":"2003","journal-title":"Inf. Secur. Tech. Rep."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2385","DOI":"10.1109\/JSYST.2017.2730580","article-title":"Signcryption method suitable for low-power IoT devices in a wireless sensor network","volume":"12","author":"Ting","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1016\/j.future.2018.04.019","article-title":"Design and analysis of authenticated key agreement scheme in cloud-assisted cyber\u2013physical systems","volume":"108","author":"Challa","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_33","first-page":"8861947","article-title":"Multiaccess edge computing empowered flying ad hoc networks with secure deployment using identity-based generalized signcryption","volume":"2020","author":"Khan","year":"2020","journal-title":"Mob. Inf. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"25808","DOI":"10.1109\/ACCESS.2017.2764913","article-title":"On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services","volume":"5","author":"Roy","year":"2017","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Qureshi, I.M., Ullah, I., Khan, S., Khanzada, F., and Noor, F. (2019). An efficient and provably secure certificateless blind signature scheme for flying ad-hoc network based on multi-access edge computing. Electronics, 9.","DOI":"10.3390\/electronics9010030"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"ur Rahman, A., Ullah, I., Naeem, M., Anwar, R., Khattak, H., and Ullah, S. (2018). A lightweight multi-message and multi-receiver heterogeneous hybrid signcryption scheme based on hyper elliptic curve. Int. J. Adv. Comput. Sci. Appl., 9.","DOI":"10.14569\/IJACSA.2018.090520"},{"key":"ref_37","first-page":"558","article-title":"Improving the security of internet of things using encryption algorithms","volume":"11","author":"Safi","year":"2017","journal-title":"Int. J. Comput. Inf. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"5099","DOI":"10.1109\/TII.2019.2894108","article-title":"Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT","volume":"15","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Han, Y., Yang, X., and Hu, Y. (2004, January 14\u201316). Signcryption based on elliptic curve and its multi-party schemes. Proceedings of the 3rd International Conference on Information Security, Shanghai, China.","DOI":"10.1145\/1046290.1046336"},{"key":"ref_40","unstructured":"Libert, B., and Quisquater, J.J. (April, January 31). A new identity based signcryption scheme from pairings. Proceedings of the 2003 IEEE Information Theory Workshop (Cat. No. 03EX674), Paris, France."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11277-017-4434-6","article-title":"Cyber security threats to IoT applications and service domains","volume":"95","author":"Skouby","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Tawalbeh, L.A., Muheidat, F., Tawalbeh, M., and Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Appl. Sci., 10.","DOI":"10.3390\/app10124102"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100641","DOI":"10.1016\/j.iot.2022.100641","article-title":"Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview","volume":"21","author":"Nayak","year":"2022","journal-title":"Internet Things"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"100759","DOI":"10.1016\/j.iot.2023.100759","article-title":"A Comprehensive Literature Survey of Cryptography Algorithms for Improving the IoT Security","volume":"22","author":"Thabit","year":"2023","journal-title":"Internet Things"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"0989","DOI":"10.21123\/bsj.2021.18.2(Suppl.).0989","article-title":"A scoping study on lightweight cryptography reviews in IoT","volume":"18","author":"Chiadighikaobi","year":"2021","journal-title":"Baghdad Sci. J."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.future.2021.08.027","article-title":"A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things","volume":"127","author":"Gong","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_47","first-page":"6945004","article-title":"An improved efficient certificateless hybrid signcryption scheme for internet of things","volume":"2022","author":"Wu","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_48","first-page":"1","article-title":"Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT","volume":"12","author":"Kiran","year":"2022","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3578942","DOI":"10.1155\/2018\/3578942","article-title":"An efficient certificateless generalized signcryption scheme","volume":"2018","author":"Zhang","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"101821","DOI":"10.1016\/j.pmcj.2023.101821","article-title":"An efficient heterogeneous signcryption scheme for internet of things","volume":"94","author":"Zhou","year":"2023","journal-title":"Pervasive Mob. Comput."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Singh, A.K., Solanki, A., Nayyar, A., and Qureshi, B. (2020). Elliptic curve signcryption-based mutual authentication protocol for smart cards. Appl. Sci., 10.","DOI":"10.3390\/app10228291"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s11082-023-04641-y","article-title":"Efficient implementation of cancelable face recognition based on elliptic curve cryptography","volume":"55","author":"Eltaieb","year":"2023","journal-title":"Opt. Quantum Electron."},{"key":"ref_53","first-page":"74","article-title":"A discussion on elliptic curve cryptography and its applications","volume":"9","author":"Verma","year":"2012","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"139903","DOI":"10.1109\/ACCESS.2020.3012823","article-title":"Kleptographic attack on elliptic curve based cryptographic protocols","volume":"8","author":"Sajjad","year":"2020","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"100530","DOI":"10.1016\/j.cosrev.2022.100530","article-title":"Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey","volume":"47","author":"Ullah","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref_56","first-page":"126239","article-title":"Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems","volume":"404","author":"Hu","year":"2021","journal-title":"Appl. Math. Comput."},{"key":"ref_57","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., and Paar, C. (2003). Cryptographic Hardware and Embedded Systems-CHES 2003, Proceedings of the 5th International Workshop, Cologne, Germany, 8\u201310 September 2003, Springer."},{"key":"ref_58","first-page":"619","article-title":"DARIM: Dynamic approach for rumor influence minimization in online social networks","volume":"Volume 12","author":"Hosni","year":"2019","journal-title":"International Conference on Neural Information Processing"},{"key":"ref_59","first-page":"93","article-title":"Least cost rumor influence minimization in multiplex social networks","volume":"Volume 13","author":"Hosni","year":"2018","journal-title":"International Conference on Neural Information Processing"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1007\/s12243-011-0244-0","article-title":"An ID-based proxy signature schemes without bilinear pairings","volume":"66","author":"Debiao","year":"2011","journal-title":"Ann. Telecommun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.comcom.2021.10.010","article-title":"Certificateless signature schemes in Industrial Internet of Things: A comparative survey","volume":"181","author":"Hussain","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_62","first-page":"6561622","article-title":"A natural language processing (NLP) evaluation on COVID-19 rumour dataset using deep learning techniques","volume":"2022","author":"Fatima","year":"2022","journal-title":"Comput. Intell. Neurosci. J."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"e25","DOI":"10.1002\/spy2.25","article-title":"Heterogeneous signcryption with keyword search for wireless body area network","volume":"1","author":"Omala","year":"2018","journal-title":"Secur. Priv."},{"key":"ref_64","unstructured":"Ashraf Ch, S., Nizamudin, and Sher, M. (2012). Information Systems, Technology and Management, Proceedings of the 6th International Conference, ICISTM 2012, Grenoble, France, 28\u201330 March 2012, Springer."},{"key":"ref_65","unstructured":"AVISPA (2022, May 05). Automated Validation of Internet Security Protocols and Applications. Available online: http:\/\/www.avispaproject.org."},{"key":"ref_66","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., and Mantovani, J. (2005). Computer Aided Verification, Proceedings of the 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, 6\u201310 July 2005, Springer."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/5\/282\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:42:53Z","timestamp":1760107373000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/5\/282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":66,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["info15050282"],"URL":"https:\/\/doi.org\/10.3390\/info15050282","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2024,5,15]]}}}