Performance evaluation of Attribute-Based Encryption on constrained IoT devices

2021 ◽  
Vol 170 ◽  
pp. 151-163
Author(s):  
Pericle Perazzo ◽  
Francesca Righetti ◽  
Michele La Manna ◽  
Carlo Vallati
Author(s):  
Fei Meng ◽  
Leixiao Cheng ◽  
Mingqiang Wang

AbstractCountless data generated in Smart city may contain private and sensitive information and should be protected from unauthorized users. The data can be encrypted by Attribute-based encryption (CP-ABE), which allows encrypter to specify access policies in the ciphertext. But, traditional CP-ABE schemes are limited because of two shortages: the access policy is public i.e., privacy exposed; the decryption time is linear with the complexity of policy, i.e., huge computational overheads. In this work, we introduce a novel method to protect the privacy of CP-ABE scheme by keyword search (KS) techniques. In detail, we define a new security model called chosen sensitive policy security: two access policies embedded in the ciphertext, one is public and the other is sensitive and hidden. If user's attributes don't satisfy the public policy, he/she cannot get any information (attribute name and its values) of the hidden one. Previous CP-ABE schemes with hidden policy only work on the “AND-gate” access structure or their ciphertext size or decryption time maybe super-polynomial. Our scheme is more expressive and compact. Since, IoT devices spread all over the smart city, so the computational overhead of encryption and decryption can be shifted to third parties. Therefore, our scheme is more applicable to resource-constrained users. We prove our scheme to be selective secure under the decisional bilinear Diffie-Hellman (DBDH) assumption.


Author(s):  
Benedetto Girgenti ◽  
Pericle Perazzo ◽  
Carlo Vallati ◽  
Francesca Righetti ◽  
Gianluca Dini ◽  
...  

2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


2021 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


Author(s):  
Hassan B. Hassan ◽  
Qusay I. Sarham

Introduction: With the rapid deployment of embedded databases across a wide range of embedded devices such as mobile devices, Internet of Things (IoT) devices, etc., the amount of data generated by such devices is also growing increasingly. For this reason, the performance is considered as a crucial criterion in the process of selecting the most suitable embedded database management system to be used to store/retrieve data of these devices. Currently, many embedded databases are available to be utilized in this context. Materials and Methods: In this paper, four popular open-source relational embedded databases; namely, H2, HSQLDB, Apache Derby, and SQLite have been compared experimentally with each other to evaluate their operational performance in terms of creating database tables, retrieving data, inserting data, updating data, deleting data. Results and Discussion: The experimental results of this paper have been illustrated in Table 4. Conclusions: The experimental results and analysis showed that HSQLDB outperformed other databases in most evaluation scenarios.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Tao Zhang ◽  
Xiongfei Song ◽  
Lele Zheng ◽  
Yani Han ◽  
Kai Zhang ◽  
...  

Mobile crowdsensing systems use the extraction of valuable information from the data aggregation results of large-scale IoT devices to provide users with personalized services. Mobile crowdsensing combined with edge computing can improve service response speed, security, and reliability. However, previous research on data aggregation paid little attention to data verifiability and time sensitivity. In addition, existing edge-assisted data aggregation schemes do not support access control of large-scale devices. In this study, we propose a time-sensitive and verifiable data aggregation scheme (TSVA-CP-ABE) supporting access control for edge-assisted mobile crowdsensing. Specifically, in our scheme, we use attribute-based encryption for access control, where edge nodes can help IoT devices to calculate keys. Moreover, IoT devices can verify outsourced computing, and edge nodes can verify and filter aggregated data. Finally, the security of the proposed scheme is theoretically proved. The experimental results illustrate that our scheme outperforms traditional ones in both effectiveness and scalability under time-sensitive constraints.


Author(s):  
Hayoung Oh

Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1488 ◽  
Author(s):  
Carlo Puliafito ◽  
Carlo Vallati ◽  
Enzo Mingozzi ◽  
Giovanni Merlino ◽  
Francesco Longo ◽  
...  

The internet of things (IoT) is essential for the implementation of applications and services that require the ability to sense the surrounding environment through sensors and modify it through actuators. However, IoT devices usually have limited computing capabilities and hence are not always sufficient to directly host resource-intensive services. Fog computing, which extends and complements the cloud, can support the IoT with computing resources and services that are deployed close to where data are sensed and actions need to be performed. Virtualisation is an essential feature in the cloud as in the fog, and containers have been recently getting much popularity to encapsulate fog services. Besides, container migration among fog nodes may enable several emerging use cases in different IoT domains (e.g., smart transportation, smart industry). In this paper, we first report container migration use cases in the fog and discuss containerisation. We then provide a comprehensive overview of the state-of-the-art migration techniques for containers, i.e., cold, pre-copy, post-copy, and hybrid migrations. The main contribution of this work is the extensive performance evaluation of these techniques that we conducted over a real fog computing testbed. The obtained results shed light on container migration within fog computing environments by clarifying, in general, which migration technique might be the most appropriate under certain network and service conditions.


Sign in / Sign up

Export Citation Format

Share Document