• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps

    2022-08-23 02:16:34ChandrashekharMeshramAgbotinameLuckyImoizeSajjadShaukatJamalAmerAljaediandAdelAlharbi
    Computers Materials&Continua 2022年6期

    Chandrashekhar Meshram,Agbotiname Lucky Imoize,Sajjad Shaukat Jamal,Amer Aljaedi and Adel R.Alharbi

    1Department of Post Graduate Studies and Research in Mathematics,Jayawanti Haksar Government Post-Graduation College,College of Chhindwara University,Betul,460001,M.P.,India

    2Department of Electrical and Electronics Engineering,Faculty of Engineering,University of Lagos,Akoka,100213,Lagos,Nigeria

    3Department of Electrical Engineering and Information Technology,Institute of Digital Communication,Ruhr University,44801,Bochum,Germany

    4Department of Mathematics,College of Science,King Khalid University,Abha,Saudi Arabia

    5College of Computing and Information Technology,University of Tabuk,Tabuk 71491,Saudi Arabia

    Abstract:The commercialization of the fifth-generation(5G)wireless network has begun.Massive devices are being integrated into 5G-enabled wireless sensor networks(5G WSNs)to deliver a variety of valuable services to network users.However,there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities.For secure end-to-end communication,key agreement and user authentication have been proposed.However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required.Data integrity, nonrepudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty difficult to create in practice.To address this issue,this work provides an efficient,provably secure,lightweight subtreebased online/offline signature procedure(SBOOSP)and its aggregation(Agg-SBOOSP)for massive devices in 5G WSNs using conformable chaotic maps.The SBOOSP enables multi-time offline storage access while reducing processing time.As a result, the signer can utilize the pre-stored offline information in polynomial time.This feature distinguishes our presented SBOOSP from previous online/offline-signing procedures that only allow for one signature.Furthermore, the new procedure supports a secret key during the pre-registration process, but no secret key is necessary during the offline stage.The suggested SBOOSP is secure in the logic of unforgeability on the chosen message attack in the random oracle.Additionally, SBOOSP and Agg-SBOOSP had the lowest computing costs compared to other contending schemes.Overall, the suggested SBOOSP outperforms several preliminary security schemes in terms of performance and computational overhead.

    Keywords: Subtree-based online/offline signature procedure (SBOOSP); 5G WSNs;provably secure scheme;massive devices;conformable chaotic maps

    1 Introduction

    Massive access configuration enables the sharing of radio spectrum amongst an enormous number of devices.Massive access presents a potential risk of information leakage because one device in the network setting can receive a signal from other devices in the network.In order to address this access security problem, upper layer encryption techniques have been deployed[1].However, wireless communication technology is fast evolving, and eavesdropping nodes are gaining significant intrusion capabilities.As a result, the traditional encryption techniques need to be significantly enhanced to guarantee the security of user information.In recent times, massive devices are gaining widespread adoption in 5G and beyond 5G wireless communications.Massive devices are designed using cost-effective nodes,and they have limited computational processing power.Therefore, they are not able to satisfy the high complexity requirements of advanced encryption techniques.

    The commercialization of fifth-generation(5G)wireless networks has facilitated advanced technologies to address the proliferating issues in 4G LTE wireless networks [2].In recent times, 5G wireless networks have witnessed the massive deployment of radio access networks to support several applications,including wireless sensor networks(WSNs)[3,4].Practically,sensor nodes in WSNs can be configured and integrated into billions of massive machine-type communication (MTC) devices(MD)in 5G wireless networks to facilitate user data transmission over WSN-assisted channels[5–7].However,there are growing concerns that the security of these channels is grossly limited,and the need to secure sensitive user data being transmitted over these channels is not negotiable[8].Toward this end,efficient,provably secure,and lightweight subtree-based online/offline signature procedures are currently being exploited to address this problem.

    1.1 Motivation and Contribution

    This paper presents a comprehensive overview of efficient,provably secure,lightweight subtreebased online/offline signature procedures.Most schemes are designed based on hard problems that are relatively difficult to solve in practice from the literature review.Such schemes require high computing resources and prohibitive communication costs.Moreover, most of these schemes cannot be tested entirely using AVISPA,Scyther,and other security validation tools.Therefore,deploying such schemes in small devices with limited computational resources can be detrimental and pose serious reliability issues.In order to address this problem, the need to exploit efficient, provably secure, lightweight subtree-based online/offline signature procedure (SBOOSP) to boost the security and extends the processing capabilities of resource-limited massive devices in 5G WSNs is not out of place.Thus,we present an efficient,provably secure,lightweight subtree-based online/offline signature procedure(SBOOSP)for massive devices in 5G WSNs.It is worth mentioning that the proposed SBOOSP lowers the computational and communications costs drastically.

    Additionally, the current study is motivated by using conformable chaotic maps to design the SBOOSP scheme for application in massive devices in 5G WSNs.The proposed SBOOSP demonstrates appreciable security in random oracle unforgeability of subtree-based signature(STBS)under chosen message attack.Furthermore,we present an extension to the proposed SBOOSP to facilitate the registration and implementation of different messages in 5G WSNs.Additionally, our SBOOSP was tested and compared with several schemes using standard metrics.Finally, our SBOOSP offers robust and superior security characteristics to the preliminary schemes applied to resource-limited and low-powered devices in 5G WSNs.

    1.2 Paper Organization

    The rest of this work is arranged in the following manner.Section 2 gives a brief literature review.Section 3 presents the preliminary background to conformable chaotic maps and notations associated with subtree.Section 4 offers the proposed efficient,provably secure,lightweight subtreebased online/offline signature procedure for massive devices in 5G WSNs using conformable chaotic maps.In Section 5,the security examinations and helpful discussions are reported.The aggregation of the proposed SBOOSP scheme for massive devices in 5G WSNs is highlighted in Section 6.Section 7 discusses the performance analysis of SBOOSP and Agg-SBOOSP.The primary setting of the SBOOSP technique for massive devices in 5G WSNs is presented in Section 8.Finally, a concise conclusion to the paper is specified in Section 9.

    2 Related Works

    The traditional encryption schemes depend on secure key distribution that may not find practical applications in massive devices such as grant-free random access in 5G and beyond 5G wireless networks.Thus,there is a need to deploy physical layer security schemes to complement the conventional encryption schemes to guarantee secured massive access in 5G WSNs[9].The physical layer security ensures that the eavesdropping channel capacity is less than the information transmission percentage of the link being considered.Consequently, it becomes challenging for the eavesdropper to decode the intercepted signal accurately [10,11].In order to improve the secrecy performance of physical layer security, there is a need to degrade the quality of the eavesdropping signal while enhancing the quality of the desired signal significantly.Thus, multiple-antenna schemes have been employed to provide physical-layer security [12].By transmitting the desired signal in the null space of the eavesdropping channel matrix,it becomes extremely difficult for the legitimate signal to be intercepted by the eavesdropper[13,14].However,the high spatial resolution of large-scale antenna arrays in 5G wireless networks can be exploited to guarantee secure access for massive devices in 5G WSNs[15,16].

    In the existing literature, Even et al.[17] proposed online/offline signature to address some of the highlighted security vulnerability issues.Part of the signature process is carried out online, and the other part was done offline.The offline-signing process consumes considerable time and is more costly in terms of computational resources.Additionally, the online signing phase is much faster,lightweight,and efficient.In Even et al.[17],a general construction suitable for transforming a digital signature technique to its online/offline signature equivalent is presented.One major limitation of this generalized construction is the extension of each signature in a quadratic time.Interestingly,Shamir et al.[18] address this fundamental limitation using the hash-sign-switch scheme that converts any signature type.Also, some special purpose schemes have been proposed [19] to enhance the Shamir and Tauman scheme.

    Kurosawa et al.[20], proposed online/offline signature procedures independent of the random oracle.Additionally,short signatures[21]and efficient online/offline schemes[22]without the random oracle have been proposed.For low-power devices,the online/offline signature procedures reported in[23]are prospective.Also,lattice-based online/offline signature procedures are given in[24].Furthermore, Xu et al.[25] presented an identity-based online/offline multi-purpose signatures procedure.Though the scheme found practical applications in IoTs and WSNs, several limitations have been reported.Li et al.[26] noticed that the scheme [25] could not restrain forgery attacks.However,recent studies have shown that Li et al.’s scheme is not entirely free from security flaws.Several security schemes reported in the literature have demonstrated various limitations requiring massive improvements.In order to address this problem, chaotic maps assisted schemes are currently being deployed to secure 5G wireless communication channels[27].These schemes have been widely applied to hash functions [28], symmetric encryption [29], S-boxes [30], and provably secure online/offline identity-based signature techniques[31].

    Chain et al.[32],proposed a chaotic map-based digital signature scheme.Similarly,chaotic mapassisted cryptographic schemes have been highlighted in[33],and identity-based encryption schemes have been presented[34].Lately,Meshram et al.[33]presented an online/offline IBSS scheme based on a partial discrete logarithm.The scheme accepts pre-stored information for offline signature in a polynomial time.Furthermore,Meshram et al.[35]suggested an aggregation scheme for deployment in WSNs.The scheme requires lower computational resources and presents a faster processing time compared to the preliminaries.In recent times, a chaotic maps-assisted subtree-centric model for cryptosystems in cloud-based environments was proposed[36].In[37],fractional chaotic maps based on short signature schemes under human-centered IoT situations have been reported.Also,the authors[38]created an efficient and highly secured level subtree-based online/offline short signature procedure using chaotic theory.

    There is no doubt that a few works related to the current paper have been reported.For instance,Maxwell’s source issue with random input data has been expanded leveraging conformally mapped polynomials[39].Also,conformal-based mapped polynomial chaos expansions have been carried out for uncertain dynamical systems [39].Additionally, conformal Chebyshev chaotic maps have been deployed for the robust construction of authentication protocol for healthcare telemedicine services[40].It is worth mentioning that Conformable Chaotic Maps(CCM)-based lightweight schemes are highly coveted to support the security of critical user information transmitted over 5G WSNs channels.However,the works[39–41]did not consider the application of conformable chaotic maps in the design of secure lightweight subtree-based online/offline signature procedure for massive devices in 5G WSNs as in the current paper.

    3 Background and Material

    The notations we utilize in our new procedure,SBOOSP using conformable chaotic maps under the fuzzy user data allotment for 5G WSNs,will be laid out in this section.Then we will go over some mathematical definitions and some fundamental notions of conformable chaotic maps.

    3.1 Notations

    Our SBOOSP for 5G WSNs uses conformable chaotic maps with fuzzy user data sharing.The following are the notations we used in our presented SBOOSP.When there is no doubt,we use[y,]as a shorthand for{y,y+1,...,},and[y]for[1,y].Allow Si?={i?1,...,i?k}to be a set of(i?)identities that comprise all identities execution in i? for every i? =(i?1,i?2,...,i?k), where i? is an identity vector.The position histories of i? in the model’s tree structure are defined as Ii?=The expected recipients form a subtree in a tree-organized identity-based signature/encryption procedure[38,42].In the tree structure,the identity vectors and the positions of their receivers are unified into T.Any genuine T must be able to cover the root node.This indicates that the PKG is in control of the structure.Also, T’s identity set and T’s position indices are denoted by ST= ∪i?∈TSi?and Ii?= {i: i?i∈ ST}.Similarly, the phrase Sup(i?)= {(i?1,i?2,...,i?k′): k′≤ k} can be used to show that i? =(i?1,i?2,...,i?k)is superior.Subtree T’s anticipated receivers are considered asSup(T)=∪i?∈TSup(i?).

    Let us explore how the symbolizations work with the subtree-based architecture SBOOSP for massive devices in 5G WSNs.The proposed procedure is good for ensuring fuzzy entity data distribution while meeting security standards and specifications.Nevertheless, it has problems with multi-receiver efficiency.Assume the users are arranged in the tree structure,as indicated in Fig.1.To specify a prearranged user with i?=(B,F,),the position indices of i? and identity set are Ii?={2,6}and Si?= {B,F}respectively.The user builds a collection of Sup(i?)= {(B,F),(B)}that includes both herself/himself and her/his superiors.When a data owner delivers a message to a subtree like T={(B,G),(B,F),(A)},the message is sent to a set of receivers in that subtree.ST={A,B,F,G}and IT={1,2,6,7}are the identity set and location indices of T,respectively.T’s superiors are demarcated as Sup(T)={(A),(B),(B,F),(B,G)},which is the user contract that the proprietor of the data wants to express.

    Figure 1:An illustration of a signature structure based on subtrees

    3.2 Chebyshev Chaotic Polynomials

    We examine the operatory of Chebyshev sequential polynomials(CSP)(see[43]).CSP T(y)is a-degree polynomial in the variant.Let ∈[-1,1]be the arrangement,and be an integer.CSP reported the following in general:

    Under this circumstance,the functionalcos-1and cosrepresented ascos-1:[-1,1]→[0,π]and cos: R →[-1,1].

    CSP[33,36–38,44]has two primary properties:chaotic and semi-group properties.

    1.The chaotic properties:The CSP map is demarcated as[-1,1]→[-1,1]with degree>1,is a chaotic map associated with the (invariant density) functionalfor the positive Lyapunov exponentλ=ln0.

    2.The possessions of what is referred to as a semi-group satisfy the following conditions:

    where ∈[-1,1]and a and c are positive integers.

    Zhang[44]demonstrated that the semi-group property retains the interval(-∞,+∞),which may be used to improve the property as tracks:

    and the semi-group property is also preserved.It is noteworthy that the extended Chebyshev polynomials also commute under conformation.

    Chebyshev polynomials(CP)have two assessments that consider handling in polynomial time:

    1.Given two elements and v,the discrete log’s(DL)task is to invent an integer a with the end goal Ta=v.

    2.Because of three elements ,Ta(y),and Tc(y),the Diffie-Hellman problem(DHP)task is to measure the Tacelement.

    3.3 Conformable Chebyshev Chaotic Maps(CCCM)

    The conformable calculus(CC)was previously specified as conformable fractional calculus(CFC)[45].Nonetheless,it is straining the recognized properties for fractional calculus(derivatives of noninteger power).Fundamentally,CC takes the subsequent preparation:

    Assume∈[0,1]is a fractional(arbitrary)number.If and only if δ0is the self-operator and δ1is the typical difference operational,an operatoris conformable differential.Clearly,δνis conformable if and only if,for differentiable utility.

    Recently,Anderson et al.[45]offered a novel formulation of CC created by the control theory to designate the performance of proportional-differentiation controller conforming to the error function.The instruction has the following organization.

    Definition 3.1Suppose that∈[0,1],then CC has in the subsequent documentation:

    where the functions μ1and μ0attain the boundaries

    The frequent formula(1)can replace by(2)

    3.3.1 Properties of CCCM:TheCCCM has the Following Two Stimulating Possessions

    Definition 3.2(Chaotic properties of CCCM).The Conformable Chebyshev Chaotic Maps fulfills the recurrent relations under chaotic property[46]i.e.,

    Definition 3.3(Semi-group properties of CCCM).The semi-group properties look for CCCMs located on interval(-∞,∞)[46],i.e.,

    Note that,when →0 is used,we get the original case from[44].

    At this point,we note that the DL and assignments for the CCP are approximately DHP occur.

    Figure 2:CCP for different values of =0.25,0.5,1 with =and

    4 The Proposed SBOOSP Using Conformable Chaotic Maps

    We will describe the novel efficient SBOOSP for massive devices in 5G WSNs that we have devised in this section.The plan is made up of five steps described as follows.

    4.1 Setup

    4.2 Extraction

    The client’s private key is the pair(ξ,χ).It is worth noting that a properly created secret key must satisfy the following equality:

    4.3 Offline-Signing

    In the offline stage,the signer does the following calculation:

    At the offline phase,we do not need the private key or knowledge of the message.It can also be considered a public parameter prepared by the(trusted)PKG rather than the offline-signing step.

    4.4 Online-Signing

    At the online phase,to register a message M ∈(-∞,∞)using(ξ,χ),the signer selects x ∈Rat random.Let x[i] be the ithbit of x.Describe Y ?{1,...,|1|} to be the set of indices such that x[i]=1.

    The signature ? is(V,ξ,k).

    4.5 Verification

    To verify the signature ? =(V,ξ,k)fori? and M,the verifier initially calculatesζ=(V,ξ,M)and determines whether

    If it is equal,accept it.Reject otherwise.

    Remark 1.Following earlier discussions in this paper, any trusted third party can execute the offline signing algorithm as no secret data is required.Additionally, offline data can be reused gainfully.In practice, If the offline signing stage, which the PKG handles, is included in the setup process(and the offline data is placed as part of the public parameter).The suggested technique is a usual identity-based signature procedure with a fast-signing process that does not need exponentiation.

    5 Security Investigations and Discussions

    To demonstrate that our novel SBOOSP based on conformable chaotic maps is secure,we employ the Bellare et al.[47]acquiesced security proofs.

    ands—Signing Oracle (SO) signing inquiries,—hashing inquiries,E—Extraction Oracle (EO)inquiries measure chaos,andτis the time to do an exponentiation operation.

    (ξ,χ)is generated as a secret key for i? ∈ Sup(T)by B, and the uniformity assessment(ξ,(ξ,i?),χ,i?)is saved in a list by B.

    Cost Reduction Investigation:The random oracle’s consignmentξ,i?)is irregular, requiring a mutual probability of at leastThis is assumed in the simulation procedure with extraction oracle failures.The simulation technique is effectivetimes(as a result of the fact that(ξ,i?)can also be asked in the signing oracle if i? ∈Sup(T)is not demanded in the extraction oracle),with the probability being:

    The exponentiations used in the signature and extraction operations determine the process B’s temporal complexity,which is the same as:

    6 Aggregation Procedure(Agg-SBOOSP)of the SBOOSP for 5G WSNs

    It would be highly advantageous if a sensor node (SN) could sign not just one butiseparate messages simultaneously, with the aggregate signature having the same length as a single message’s signature or substantially shorter than the length of a single signature multiplied byi.Such an aggregate signature is essential in massive devices in 5G WSNs since it can drastically reduce sensor node communication overheads.This paper presents the new online/offline identity-based aggregation strategy for the proposed SBOOSP using conformable chaotic maps.It is made up of the five segments listed as follows.

    6.1 Setup

    6.2 Extraction

    6.3 Offline-Signing

    6.4 Online-Signing

    6.5 Verification

    If it is equal,accept it.Reject otherwise.

    7 Performance Investigation

    We compare our new SBOOSP to six previous strategies proposed by[33,38,48–51],in this section.We also compare our presented Agg-SBOOSP (extended SBOOSP) procedure to five other related strategies proposed by [33,38,48,50,51], respectively, to demonstrate the efficacy of our innovative design.The notationsare utilized to present our evaluation results.In the signature (online and offline) stage and verification stage, we represent the execution time for a group modular exponentiation, a bilinear pairing operation, a chaotic map operationa modular multiplication,and a one-way hash function.It is worth noting that the signature and verification steps are the only ones that require more computing power than the setup and extraction stages.By comparing the computational costs of our present SBOOSP to the works of[33,38,48–51],we look at the steps of signature and verification.In a similar vein,we compare our new presented Agg-SBOOSP with the works of[35,38,48,50,51].

    Tab.1 shows the proposed SBOOSP’s functionalities, and Fig.3 compares the computational costs of existing relevant protocols [33,38,48–51].Tab.2 also includes a functional study of the proposed Agg-SBOOSP,as well as a comparison of computational costs in Fig.4 with other relevant protocols [35,38,48,50,51].We arrive at the following computation time statistics with unit hashing time based on the results of the experiments in [46,52,53]:The following is the order of computational complexity in this method:Recall the running time of hash is 0.06 ms[46,52]and that[ =0.5].References [33,38,48–51], and the SBOOSP, respectively, have total communication costs of 108.57,144.9,466.08,315.48,1.35,1.05,and 0.85 ms.References[35,38,48,50,51],and the Agg-SBOOSP have total communication costs of 108.57,279.87,351.72,108.57,1.26 and 1.06 ms,respectively.

    Based on the classical results in [46,52,53], we arrive at the following computation time values with unit hashing time:

    Table 1: Computational cost assessment of SBOOSP with other procedures

    Figure 3:Communication cost(ms)analysis of SBOOSP with other procedures

    As indicated in Fig.3,the interaction value of the suggested SBOOSP is the lowest attained.The tests frequently transform into runtime excels the rest of the linked procedures when using the proposed SBOOSP.Similarly, as the study results in Fig.4 reveal, the interaction value of the suggested Agg-SBOOSP is the lowest.The proposed Agg-SBOOSP frequently transforms tests into runtime and outperforms the other related procedures similar to the SBOOSP.It is interesting to note that the results presented in this paper show related characteristics to the results reported in[54].Next,we shall examine the basic setting for implementing the proposed SBOOSP in massive devices in 5G WSNs.

    Table 2: Computational cost assessment of Agg-SBOOSP with other procedures

    Figure 4:Communication cost(ms)analysis of Agg-SBOOSP with other procedures

    8 Implementation for Massive Devices in 5G WSNs

    8.1 Basic Setting

    In a single-hop context (see Fig.5), each SN can sign messages with its private signing key accompanying its i? identifier information.According to our assumptions,the system parameter is created by the base station(BS).It is integrated with each SN when installed—assuming that either the sensor nodes or the base station can verify the signatures created by the SNs.As with 5G WSNs,we suppose that the BS is robust to computationally complex cryptographic processes,whereas the SNs have limited computing,memory,and battery power resources.Also,we assume that the BS’s private key is safely stored in a trusted server.

    The main components of the 5G wireless access network are the 5G access and core networks,as depicted in Fig.6.In the 5G access network,two nodes called Next Generation evolved NodeB(ngeNB)and Next Generation NodeB(gNB)are described briefly.In this configuration,the new radio(NR)user plane and control plane procedures and functions for 5G network users are provided by the gNB.Similarly,the NR user plane and control plane procedures and functions are provided by the ngeNB for the 4G network users.As illustrated in Fig.6,the interface among ng-eNB and gNB is called the Xn interface.The 5G core network part of the configuration in Fig.6 comprises several nodes such as the 5G core Access and Mobility Management Function (AMF) and User Plane Function(UPF) [55].The function of the AMF involves accessing mobility management functions for access control and mobility management.The management of sessions associated with network policies is conducted by the session management function(SMF).Additionally,the UPF performs the user plane functions and can be deployed to different configurations and locations in the 5G wireless network.The proposed system model comprises the registration center(RC),the 5G Massive Devices(MDs),and the 5G core network (5GC).The RC is the entity designed to conduct honest and trust-based functions.The primary function of the RC is to register and or generate system parameters for the massive devices and the AMF based on their identities.The MDs transfer user information to the core network via the ng-eNB.Additionally, the AMF aggregates authentication on the user information received from the MDs and ensures the decryption of the authenticated data holistically.The proposed SBOOSP scheme can be deployed in this setting to provide efficient and robust security for MDs in 5G wireless sensor networks.

    Figure 5:Overview of system implementation

    Figure 6:Basic setting of massive devices in 5G wireless networks for the proposed SBOOSP scheme

    9 Conclusion

    For massive devices in 5G wireless sensor networks with fuzzy user data sharing, this paper presented a new provably secure,lightweight SBOOSP and its aggregation(Agg-SBOOSP)leveraging conformable chaotic maps.In our proposition,each procedure is carried out with the fewest possible operations,thereby reducing the computational processing time of the scheme.Results indicate that the SBOOSP technique performs efficiently and independently of a certificate to verify and validate the signature without requiring pairing operations.As a result,the SBOOSP provides strong security in the random oracle paradigm with high unforgeability when a message is chosen.Additionally,the SBOOSP achieves multi-time offline storage at minimal complexity.Consequently, the signer can utilize the offline pre-stored information in polynomial time,demonstrating a significant advantage over most existing online/offline signature procedures that only allow for a single signature attempt.Furthermore, the new procedure allows for a secret key during the pre-registration process, but no secret key is necessary during the offline stage.The results of the performance investigation of SBOOSP and Agg-SBOOSP approaches are excellent.In comparison to various contenders, the proposed procedures have the lowest computing costs.Finally, both informal and formal security investigations of the proposed procedures demonstrate that the schemes can withstand all well-known attacks with exceptional security features at the lowest communication costs.Future work would focus on an efficient,lightweight,provably secure identity-based online/offline short signature procedure for massive devices in 5G WSNs using the concept of SBOOSP.

    Acknowledgement:The authors would like to thank anonymous reviewers of Computers,Materials&Continua Journal for their careful and helpful comments.We extend our gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups program under grant number R.G.P.1/72/42.The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund(PTDF)and the German Academic Exchange Service(DAAD)through the Nigerian-German Postgraduate Program under Grant 57473408.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    香蕉av资源在线| 亚洲中文字幕日韩| 黄片播放在线免费| 老司机福利观看| 制服诱惑二区| 午夜免费成人在线视频| 成人永久免费在线观看视频| 国产aⅴ精品一区二区三区波| 99热6这里只有精品| 高清毛片免费观看视频网站| 精品久久久久久久毛片微露脸| 午夜福利一区二区在线看| 99国产精品一区二区三区| 久久性视频一级片| 亚洲第一青青草原| 一级a爱片免费观看的视频| 亚洲熟女毛片儿| 国产亚洲精品一区二区www| 久久久精品国产亚洲av高清涩受| a级毛片在线看网站| 极品教师在线免费播放| 精品乱码久久久久久99久播| www.自偷自拍.com| 91九色精品人成在线观看| 人人澡人人妻人| 老司机福利观看| 女警被强在线播放| a级毛片在线看网站| 国产精品爽爽va在线观看网站 | 久久久久久久精品吃奶| 国产精品,欧美在线| 婷婷精品国产亚洲av在线| 黄网站色视频无遮挡免费观看| 亚洲专区字幕在线| 免费观看精品视频网站| 欧美日韩亚洲国产一区二区在线观看| 国产麻豆成人av免费视频| 99riav亚洲国产免费| 精品国产美女av久久久久小说| 国产精品久久久av美女十八| 国产高清视频在线播放一区| 日本熟妇午夜| 热re99久久国产66热| 法律面前人人平等表现在哪些方面| 欧美色视频一区免费| 久久精品91无色码中文字幕| 90打野战视频偷拍视频| 男女下面进入的视频免费午夜 | 夜夜看夜夜爽夜夜摸| xxx96com| 制服人妻中文乱码| 一卡2卡三卡四卡精品乱码亚洲| 99精品久久久久人妻精品| 色播亚洲综合网| 国产私拍福利视频在线观看| 欧美av亚洲av综合av国产av| 麻豆久久精品国产亚洲av| 欧美日韩精品网址| 成人精品一区二区免费| 成人18禁在线播放| 精品久久蜜臀av无| 久久中文字幕一级| av中文乱码字幕在线| 日本黄色视频三级网站网址| 少妇熟女aⅴ在线视频| 脱女人内裤的视频| www.熟女人妻精品国产| 亚洲国产中文字幕在线视频| 亚洲免费av在线视频| 中文字幕人妻熟女乱码| 天天添夜夜摸| 国产精品,欧美在线| 草草在线视频免费看| 丁香欧美五月| 久久国产精品影院| 精品久久久久久久久久免费视频| 熟女少妇亚洲综合色aaa.| 非洲黑人性xxxx精品又粗又长| 精品欧美国产一区二区三| www.www免费av| 免费搜索国产男女视频| 色精品久久人妻99蜜桃| 国产黄a三级三级三级人| 宅男免费午夜| 亚洲片人在线观看| 色综合亚洲欧美另类图片| 国产精品香港三级国产av潘金莲| 麻豆久久精品国产亚洲av| 熟女电影av网| 黑人巨大精品欧美一区二区mp4| 美国免费a级毛片| 亚洲国产欧美网| 国产熟女xx| 成人三级黄色视频| 欧美亚洲日本最大视频资源| 日本免费一区二区三区高清不卡| 亚洲真实伦在线观看| 久久久久亚洲av毛片大全| 男女午夜视频在线观看| 女人高潮潮喷娇喘18禁视频| 亚洲国产欧洲综合997久久, | 欧美色视频一区免费| 狂野欧美激情性xxxx| 日本在线视频免费播放| 久久国产亚洲av麻豆专区| 成年版毛片免费区| 伊人久久大香线蕉亚洲五| 99re在线观看精品视频| 国产精品九九99| 亚洲狠狠婷婷综合久久图片| 免费女性裸体啪啪无遮挡网站| 国产成人精品无人区| 欧美乱妇无乱码| 婷婷丁香在线五月| 亚洲av中文字字幕乱码综合 | 午夜福利免费观看在线| 亚洲七黄色美女视频| 国产精品美女特级片免费视频播放器 | 欧美一级a爱片免费观看看 | 国产熟女xx| 亚洲精品一卡2卡三卡4卡5卡| 91成人精品电影| 91麻豆精品激情在线观看国产| 搡老妇女老女人老熟妇| 男人的好看免费观看在线视频 | 欧洲精品卡2卡3卡4卡5卡区| 日日摸夜夜添夜夜添小说| 国产乱人伦免费视频| 久久久久亚洲av毛片大全| 欧美激情 高清一区二区三区| 女性生殖器流出的白浆| 18禁裸乳无遮挡免费网站照片 | 亚洲国产欧美网| 757午夜福利合集在线观看| 久久久久久九九精品二区国产 | 日韩欧美一区视频在线观看| 一二三四社区在线视频社区8| 国产精品久久久久久人妻精品电影| 桃色一区二区三区在线观看| 日韩大尺度精品在线看网址| 一本大道久久a久久精品| 日韩欧美 国产精品| 黄片小视频在线播放| 成在线人永久免费视频| 久久天躁狠狠躁夜夜2o2o| 丝袜人妻中文字幕| 成人三级做爰电影| 9191精品国产免费久久| 亚洲av中文字字幕乱码综合 | 亚洲七黄色美女视频| 老司机午夜十八禁免费视频| 久久国产精品人妻蜜桃| 亚洲自偷自拍图片 自拍| 免费看a级黄色片| 久久香蕉国产精品| 国产真实乱freesex| 日韩欧美在线二视频| av电影中文网址| 黄色 视频免费看| 亚洲精品色激情综合| 可以在线观看的亚洲视频| 禁无遮挡网站| 美女 人体艺术 gogo| 50天的宝宝边吃奶边哭怎么回事| 亚洲av五月六月丁香网| 国产精品影院久久| 亚洲av电影在线进入| 麻豆国产av国片精品| aaaaa片日本免费| 国内精品久久久久精免费| 国产精品1区2区在线观看.| 99re在线观看精品视频| 叶爱在线成人免费视频播放| 1024手机看黄色片| 亚洲av电影不卡..在线观看| 一本大道久久a久久精品| 亚洲精品中文字幕在线视频| 97人妻精品一区二区三区麻豆 | 最近在线观看免费完整版| 99久久综合精品五月天人人| 久久 成人 亚洲| 在线观看www视频免费| 久久人人精品亚洲av| 欧美性猛交黑人性爽| 欧美成狂野欧美在线观看| 校园春色视频在线观看| 日韩精品中文字幕看吧| 此物有八面人人有两片| 变态另类丝袜制服| 亚洲五月婷婷丁香| 99热这里只有精品一区 | 老熟妇乱子伦视频在线观看| 嫩草影视91久久| 亚洲中文av在线| 亚洲成人久久爱视频| 日韩欧美在线二视频| 欧美乱色亚洲激情| 欧美日韩精品网址| 999久久久国产精品视频| 国产精品香港三级国产av潘金莲| 最近最新中文字幕大全免费视频| 成年免费大片在线观看| 国产aⅴ精品一区二区三区波| 老司机在亚洲福利影院| 欧美日本亚洲视频在线播放| 国产一区二区三区在线臀色熟女| 最近最新免费中文字幕在线| 欧美一级毛片孕妇| 免费在线观看视频国产中文字幕亚洲| 12—13女人毛片做爰片一| 黄色女人牲交| 午夜亚洲福利在线播放| 久久精品国产99精品国产亚洲性色| 国产亚洲精品综合一区在线观看 | 少妇粗大呻吟视频| 久久狼人影院| 女性生殖器流出的白浆| 久久久久国内视频| 国产成人欧美在线观看| 国产精品野战在线观看| 麻豆久久精品国产亚洲av| 久久精品影院6| 日本一区二区免费在线视频| 国产亚洲精品一区二区www| 亚洲自拍偷在线| 亚洲国产精品成人综合色| 成人18禁在线播放| 欧美日韩黄片免| 亚洲成av片中文字幕在线观看| 亚洲成av人片免费观看| 久久青草综合色| 日韩免费av在线播放| 国产精品爽爽va在线观看网站 | 好看av亚洲va欧美ⅴa在| av中文乱码字幕在线| 国产精品精品国产色婷婷| 欧美中文日本在线观看视频| 美女国产高潮福利片在线看| 两个人免费观看高清视频| 久久精品成人免费网站| 九色国产91popny在线| 亚洲中文字幕一区二区三区有码在线看 | 久久久精品国产亚洲av高清涩受| 一区二区三区国产精品乱码| 亚洲真实伦在线观看| а√天堂www在线а√下载| 老司机午夜福利在线观看视频| 高潮久久久久久久久久久不卡| 亚洲人成网站在线播放欧美日韩| 国产精品香港三级国产av潘金莲| 久久亚洲真实| 精品午夜福利视频在线观看一区| 又黄又粗又硬又大视频| 欧美成人午夜精品| 丰满的人妻完整版| 99riav亚洲国产免费| 精品第一国产精品| 国产高清视频在线播放一区| 亚洲精品国产精品久久久不卡| 香蕉国产在线看| 黄片播放在线免费| 国产成人欧美| 精品国产美女av久久久久小说| 成年人黄色毛片网站| 成人一区二区视频在线观看| 亚洲真实伦在线观看| 欧美在线一区亚洲| 成人18禁高潮啪啪吃奶动态图| 欧美日韩黄片免| 嫩草影院精品99| 婷婷丁香在线五月| 精品不卡国产一区二区三区| 天堂动漫精品| 国产极品粉嫩免费观看在线| 国产熟女xx| 精品久久久久久,| 国产精品久久久久久人妻精品电影| 亚洲第一电影网av| 少妇粗大呻吟视频| av在线天堂中文字幕| 欧美中文日本在线观看视频| 亚洲精品美女久久久久99蜜臀| 啪啪无遮挡十八禁网站| 国产单亲对白刺激| 婷婷亚洲欧美| 一进一出好大好爽视频| 丝袜人妻中文字幕| 黄色a级毛片大全视频| 丝袜在线中文字幕| 国产亚洲欧美在线一区二区| 久久香蕉激情| 9191精品国产免费久久| 日韩成人在线观看一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 精品久久蜜臀av无| 精品少妇一区二区三区视频日本电影| 久久久久久久久久黄片| 18禁黄网站禁片午夜丰满| 久久精品国产综合久久久| 久久人人精品亚洲av| 亚洲国产精品成人综合色| 亚洲天堂国产精品一区在线| 国产成人欧美| 免费高清在线观看日韩| 午夜福利成人在线免费观看| 国语自产精品视频在线第100页| 国产欧美日韩一区二区三| 精品欧美国产一区二区三| 啦啦啦韩国在线观看视频| 国产精品久久久久久亚洲av鲁大| 免费女性裸体啪啪无遮挡网站| 国产成人啪精品午夜网站| 久热爱精品视频在线9| 久久天堂一区二区三区四区| 久99久视频精品免费| 亚洲一区二区三区不卡视频| 不卡一级毛片| 免费高清在线观看日韩| 校园春色视频在线观看| 黑人巨大精品欧美一区二区mp4| 国产欧美日韩一区二区三| av福利片在线| 无限看片的www在线观看| 久久天堂一区二区三区四区| 亚洲一卡2卡3卡4卡5卡精品中文| 免费一级毛片在线播放高清视频| 亚洲精品一区av在线观看| 成人午夜高清在线视频 | 村上凉子中文字幕在线| 亚洲精品中文字幕一二三四区| 久久热在线av| 日本五十路高清| 欧美在线一区亚洲| 黄色a级毛片大全视频| 此物有八面人人有两片| 亚洲一码二码三码区别大吗| 亚洲欧洲精品一区二区精品久久久| 老司机靠b影院| 久久中文字幕人妻熟女| 欧美中文综合在线视频| 少妇粗大呻吟视频| 亚洲欧美一区二区三区黑人| 最新美女视频免费是黄的| 亚洲 国产 在线| 制服丝袜大香蕉在线| www.熟女人妻精品国产| 一进一出抽搐gif免费好疼| 亚洲人成77777在线视频| 色尼玛亚洲综合影院| 欧美一区二区精品小视频在线| 视频区欧美日本亚洲| 国产区一区二久久| 亚洲三区欧美一区| 国产一区二区三区在线臀色熟女| 亚洲国产精品久久男人天堂| 大型黄色视频在线免费观看| 欧美zozozo另类| 国内精品久久久久精免费| 成人三级黄色视频| 久久性视频一级片| 亚洲一区二区三区不卡视频| 久久婷婷人人爽人人干人人爱| 一级作爱视频免费观看| 欧美 亚洲 国产 日韩一| 国产91精品成人一区二区三区| 在线观看日韩欧美| 日韩精品中文字幕看吧| 99精品欧美一区二区三区四区| 国内精品久久久久久久电影| 少妇 在线观看| 极品教师在线免费播放| 法律面前人人平等表现在哪些方面| 伊人久久大香线蕉亚洲五| 久久人妻福利社区极品人妻图片| 亚洲精品国产一区二区精华液| 在线观看免费视频日本深夜| 哪里可以看免费的av片| 97超级碰碰碰精品色视频在线观看| 久久国产精品影院| 午夜福利免费观看在线| 色av中文字幕| 亚洲一区二区三区色噜噜| av视频在线观看入口| 欧美中文综合在线视频| 亚洲中文字幕一区二区三区有码在线看 | 免费av毛片视频| 精品欧美国产一区二区三| 看片在线看免费视频| 美女大奶头视频| 亚洲色图 男人天堂 中文字幕| 欧美乱码精品一区二区三区| av欧美777| 亚洲成av人片免费观看| 亚洲av成人一区二区三| 亚洲精品久久成人aⅴ小说| 别揉我奶头~嗯~啊~动态视频| 在线十欧美十亚洲十日本专区| 亚洲av美国av| 在线av久久热| 欧美日韩黄片免| 免费看美女性在线毛片视频| 在线播放国产精品三级| 成人国产一区最新在线观看| 91av网站免费观看| 最新美女视频免费是黄的| 日韩免费av在线播放| 亚洲七黄色美女视频| 精品第一国产精品| 2021天堂中文幕一二区在线观 | 国产伦一二天堂av在线观看| 草草在线视频免费看| 亚洲成a人片在线一区二区| 女同久久另类99精品国产91| 国产亚洲欧美在线一区二区| 少妇的丰满在线观看| 老汉色∧v一级毛片| 91av网站免费观看| 啦啦啦观看免费观看视频高清| 美女免费视频网站| 国产欧美日韩一区二区精品| 亚洲最大成人中文| 19禁男女啪啪无遮挡网站| 国产久久久一区二区三区| 精品电影一区二区在线| a在线观看视频网站| 黑人操中国人逼视频| 看黄色毛片网站| 国产精品,欧美在线| www国产在线视频色| 亚洲成人免费电影在线观看| 久久中文字幕人妻熟女| 久久热在线av| 搡老岳熟女国产| 中文字幕人妻熟女乱码| 欧美乱色亚洲激情| 长腿黑丝高跟| 99热这里只有精品一区 | 日韩欧美一区视频在线观看| 国产熟女午夜一区二区三区| 亚洲av片天天在线观看| 自线自在国产av| 人成视频在线观看免费观看| 一区二区三区国产精品乱码| 嫩草影视91久久| 亚洲精华国产精华精| 中文资源天堂在线| 国产91精品成人一区二区三区| 99久久精品国产亚洲精品| 欧美三级亚洲精品| 99久久无色码亚洲精品果冻| 可以在线观看毛片的网站| 两个人免费观看高清视频| 国产视频内射| 999久久久精品免费观看国产| 中文字幕另类日韩欧美亚洲嫩草| 精品久久久久久久人妻蜜臀av| 国产蜜桃级精品一区二区三区| 欧美色欧美亚洲另类二区| 黄色 视频免费看| 两性夫妻黄色片| 国产精品1区2区在线观看.| 99国产综合亚洲精品| 啦啦啦韩国在线观看视频| 国产在线观看jvid| 1024手机看黄色片| 在线观看66精品国产| 99国产综合亚洲精品| 久久国产亚洲av麻豆专区| 在线天堂中文资源库| 精品第一国产精品| 少妇被粗大的猛进出69影院| 两人在一起打扑克的视频| 亚洲精品国产区一区二| 日韩av在线大香蕉| 老司机深夜福利视频在线观看| 成人亚洲精品一区在线观看| 黄色毛片三级朝国网站| 波多野结衣高清作品| svipshipincom国产片| 午夜免费成人在线视频| 国产麻豆成人av免费视频| 丝袜在线中文字幕| 午夜精品在线福利| 国产亚洲av高清不卡| 国产精品久久视频播放| 老熟妇乱子伦视频在线观看| 国内毛片毛片毛片毛片毛片| 亚洲av片天天在线观看| 久久久久久久久久黄片| 制服人妻中文乱码| avwww免费| 国产成人啪精品午夜网站| 亚洲国产毛片av蜜桃av| 桃色一区二区三区在线观看| 日韩欧美国产一区二区入口| 久久久久九九精品影院| 国语自产精品视频在线第100页| 美女高潮到喷水免费观看| 夜夜躁狠狠躁天天躁| 久久亚洲精品不卡| 亚洲第一欧美日韩一区二区三区| 久久欧美精品欧美久久欧美| 日韩有码中文字幕| 久久久久久人人人人人| 两性夫妻黄色片| 日本成人三级电影网站| 啪啪无遮挡十八禁网站| 中文资源天堂在线| 天天添夜夜摸| 久久久久精品国产欧美久久久| 国内揄拍国产精品人妻在线 | 真人做人爱边吃奶动态| 国产亚洲欧美在线一区二区| 窝窝影院91人妻| 老汉色av国产亚洲站长工具| 神马国产精品三级电影在线观看 | 99国产精品一区二区蜜桃av| 欧美日韩瑟瑟在线播放| 黄频高清免费视频| 日韩国内少妇激情av| 亚洲无线在线观看| 精品国产国语对白av| 国产精品自产拍在线观看55亚洲| 看片在线看免费视频| 国产亚洲欧美在线一区二区| 波多野结衣巨乳人妻| 黄片小视频在线播放| 成人18禁高潮啪啪吃奶动态图| 黄片小视频在线播放| 精品一区二区三区av网在线观看| 深夜精品福利| 中文字幕久久专区| 99在线人妻在线中文字幕| 免费在线观看日本一区| 亚洲精品色激情综合| xxx96com| 亚洲熟妇中文字幕五十中出| 久久青草综合色| 国产一区二区在线av高清观看| 中文字幕av电影在线播放| 色综合站精品国产| 色综合婷婷激情| 久久久久久大精品| 中文资源天堂在线| 黄频高清免费视频| 天天一区二区日本电影三级| 成人午夜高清在线视频 | 免费看美女性在线毛片视频| 欧美乱色亚洲激情| 国产亚洲精品久久久久5区| 两性午夜刺激爽爽歪歪视频在线观看 | 人人妻人人澡欧美一区二区| 成年女人毛片免费观看观看9| 欧美av亚洲av综合av国产av| 精品午夜福利视频在线观看一区| 国产不卡一卡二| 国产精品永久免费网站| 在线免费观看的www视频| 亚洲在线自拍视频| 黄色视频不卡| 麻豆一二三区av精品| 亚洲性夜色夜夜综合| 亚洲自偷自拍图片 自拍| av视频在线观看入口| 国产精品一区二区精品视频观看| 亚洲精品久久国产高清桃花| 熟女电影av网| 两性夫妻黄色片| 日本免费一区二区三区高清不卡| 精品无人区乱码1区二区| 91成人精品电影| 亚洲av电影不卡..在线观看| 精品久久久久久,| 久久草成人影院| 在线永久观看黄色视频| 亚洲人成网站高清观看| 国产一区二区在线av高清观看| 国产1区2区3区精品| 黄色视频,在线免费观看| 成人欧美大片| 少妇裸体淫交视频免费看高清 | 少妇 在线观看| 十八禁人妻一区二区| 久久久久久人人人人人| 欧美人与性动交α欧美精品济南到| 一级a爱视频在线免费观看| 亚洲aⅴ乱码一区二区在线播放 | 日韩国内少妇激情av| 夜夜爽天天搞| 久久香蕉精品热| 一级作爱视频免费观看| 2021天堂中文幕一二区在线观 | 精华霜和精华液先用哪个| 中出人妻视频一区二区| 男女做爰动态图高潮gif福利片| 亚洲人成网站高清观看| 色综合站精品国产| 欧美乱色亚洲激情| 亚洲精华国产精华精| 亚洲电影在线观看av| 18禁黄网站禁片午夜丰满| 丁香欧美五月| 国内久久婷婷六月综合欲色啪| 中文字幕人妻丝袜一区二区| 99久久99久久久精品蜜桃| av视频在线观看入口| 亚洲 欧美一区二区三区| 香蕉丝袜av| 少妇 在线观看| 国产欧美日韩一区二区精品| 人人妻人人澡欧美一区二区| 桃色一区二区三区在线观看| 久久亚洲精品不卡| 成人亚洲精品av一区二区| 亚洲av美国av|