Home / Journals / CMC / Online First / doi:10.32604/cmc.2025.073441
Special Issues
Table of Content

Open Access

ARTICLE

An Efficient Certificateless Authentication Scheme with Enhanced Security for NDN-IoT Environments

Feihong Xu1, Jianbo Wu1,*, Qing An1,*, Fei Zhu1,2, Zhaoyang Han3, Saru Kumari4
1 Hubei Engineering Research Center for BDS-Cloud High-Precision Deformation Monitoring, School of Artificial Intelligence, Wuchang University of Technology, Wuhan, 430223, China
2 School of Computer Science and Artificial Intelligence, Wuhan Textile University, Wuhan, 430200, China
3 College of Information Science & Technology, Nanjing Forestry University, Nanjing, 210037, China
4 Department of Mathematics, Chaudhary Charan Singh University, Meerut, 250004, Uttar Pradesh, India
* Corresponding Author: Jianbo Wu. Email: email, email; Qing An. Email: email
(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)

Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073441

Received 18 September 2025; Accepted 15 December 2025; Published online 30 December 2025

Abstract

The large-scale deployment of Internet of Things (IoT) technology across various aspects of daily life has significantly propelled the intelligent development of society. Among them, the integration of IoT and named data networks (NDNs) reduces network complexity and provides practical directions for content-oriented network design. However, ensuring data integrity in NDN-IoT applications remains a challenging issue. Very recently, Wang et al. (Entropy, 27(5), 471(2025)) designed a certificateless aggregate signature (CLAS) scheme for NDN-IoT environments. Wang et al. stated that their construction was provably secure under various types of security attacks. Using theoretical analysis methods, in this work, we reveal that their CLAS design fails to meet unforgeability, a core security requirement for CLAS schemes. In particular, we demonstrate that their scheme is vulnerable to a malicious public-key replacement attack, enabling an adversary to produce authentic signatures for arbitrary fraudulent messages. Therefore, Wang et al.’s design cannot achieve its goal. To address the issue, we systematically examine the root causes behind the vulnerability and propose a security-enhanced CLAS construction for NDN-IoT environments. We prove the security of our improved design under the standard security assumption and also analyze its practical performance by comparing the computational and communication costs with several related works. The comparison results show the practicality of our design.

Keywords

IoT; certificateless signature; public-key replacement attack; data integrity; aggregation
  • 47

    View

  • 10

    Download

  • 0

    Like

Share Link