Table of Content

Open Access

An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

Insaf Ullah1,*, Hira Zahid2 , Fahad Algarni3, Muhammad Asghar Khan1
1 Hamdard Institute of Engineering and Technology, Islamabad, 44000, Pakistan
2 Department of Information Technology, Abbottabad University of Science and Technology, Abbottabad, Pakistan
3 College of Computing and Information Technology, The University of Bisha, Bisha, Saudi Arabia
* Corresponding Author:Insaf Ullah. Email:
(This article belongs to this Special Issue: Machine Learning for Data Analytics)

Computers, Materials & Continua 2022, 70(3), 4307-4321.

Received 29 January 2021; Accepted 06 May 2021; Issue published 11 October 2021


When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature, however, the majority of these schemes are based on homogeneous nature. This will be neither adequate nor practical for heterogeneous IoT environments. In addition, these schemes are based on bilinear pairing and elliptic curve cryptography, which further requires additional processing time and more communication overheads that is inappropriate for real-time communication. Consequently, this paper aims to solve the above-discussed issues, we proposed an access control scheme for IoT environments using heterogeneous signcryption scheme with the efficiency and security hardiness of hyperelliptic curve. Besides the security services such as replay attack prevention, confidentiality, integrity, unforgeability, non-repudiations, and forward secrecy, the proposed scheme has very low computational and communication costs, when it is compared to existing schemes. This is primarily because of hyperelliptic curve lighter nature of key and other parameters. The AVISPA tool is used to simulate the security requirements of our proposed scheme and the results were under two backbends (Constraint Logic-based Attack Searcher (CL-b-AtSER) and On-the-Fly Model Checker (ON-t-FL-MCR)) proved to be SAFE when the presented scheme is coded in HLPSL language. This scheme was proven to be capable of preventing a variety of attacks, including confidentiality, integrity, unforgeability, non-repudiation, forward secrecy, and replay attacks.


Internet of Things (IoT); access control; big data; heterogeneous signcryption

Cite This Article

I. Ullah, H. Zahid, ,. Fahad Algarni and M. Asghar Khan, "An access control scheme using heterogeneous signcryption for iot environments," Computers, Materials & Continua, vol. 70, no.3, pp. 4307–4321, 2022.


This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1190


  • 821


  • 1


Share Link

WeChat scan