Version 1
: Received: 20 October 2022 / Approved: 21 October 2022 / Online: 21 October 2022 (10:20:05 CEST)
How to cite:
Wahaballa, A. Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Preprints2022, 2022100331. https://doi.org/10.20944/preprints202210.0331.v1
Wahaballa, A. Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Preprints 2022, 2022100331. https://doi.org/10.20944/preprints202210.0331.v1
Wahaballa, A. Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Preprints2022, 2022100331. https://doi.org/10.20944/preprints202210.0331.v1
APA Style
Wahaballa, A. (2022). Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme. Preprints. https://doi.org/10.20944/preprints202210.0331.v1
Chicago/Turabian Style
Wahaballa, A. 2022 "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme" Preprints. https://doi.org/10.20944/preprints202210.0331.v1
Abstract
After the great success of Mobile wallet, the Internet of Things (IoT) leaves the door wide open for consumers to use their connected devices to access their bank accounts and perform routine banking activities from anywhere, anytime and with any device. However, consumers need to feel safe when interacting with IoT-based payment systems, and their personal information should be protected as much as possible. Unlike as usually done in the literature, in this paper, we introduce two lightweight and secure IoT-based payment protocols based on an identity-based signature scheme. We adopt a server-aided verification technique to construct the first scheme. This technique allows to outsource the heavy computation overhead on the sensor node to a cloud server while maintaining the user's privacy. The second scheme is built upon a pairing-free ECC-based security protocol to avoid the heavy computational complexity of bilinear pairing operations. The security reduction results of both schemes are held in the Random Oracle Model (ROM) under the discrete logarithm and computational Diffie-Hellman assumptions. Finally, we experimentally compare the proposed schemes against each other and against the original scheme on the most commonly used IoT devices: a smartphone, a smartwatch and the embedded device Raspberry Pi. Compared with existing schemes, our proposed schemes achieve significant efficiency in the term of communication and computational overheads
Computer Science and Mathematics, Applied Mathematics
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.