scholarly journals Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption

Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3140 ◽  
Author(s):  
Jiwon Lee ◽  
Seunghwa Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In the Internet of Things (IoT) systems, it is often required to deliver a secure message to a group of devices. The public key broadcast encryption is an efficient primitive to handle IoT broadcasts, by allowing a user (or a device) to broadcast encrypted messages to a group of legitimate devices. This paper proposes an IoT-friendly subset representation called Combinatorial Subset Difference (CSD), which generalizes the existing subset difference (SD) method by allowing wildcards (*) in any position of the bitstring. Based on the CSD representation, we first propose an algorithm to construct the CSD subset, and a CSD-based public key broadcast encryption scheme. By providing the most general subset representation, the proposed CSD-based construction achieves a minimal header size among the existing broadcast encryption. The experimental result shows that our CSD saves the header size by 17% on average and more than 1000 times when assuming a specific IoT example of IP address with 20 wildcards and 2 20 total users, compared to the SD-based broadcast encryption. We prove the semantic security of CSD-based broadcast encryption under the standard l-BDHE assumption, and extend the construction to a chosen-ciphertext-attack (CCA)-secure version.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1389
Author(s):  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size of private/public key, and the performance of encryption/decryption. It is suggested to decrease them as much as possible; however, it turns out that decreasing one increases the other in most schemes. This paper proposes a new broadcast encryption scheme for tiny Internet of Things (IoT) equipment (BESTIE), minimizing the private key size in each user. In the proposed scheme, the private key size is O(logn), the public key size is O(logn), the encryption time per subset is O(logn), the decryption time is O(logn), and the ciphertext text size is O(r), where n denotes the maximum number of users, and r indicates the number of revoked users. The proposed scheme is the first subset difference-based broadcast encryption scheme to reduce the private key size O(logn) without sacrificing the other parameters. We prove that our proposed scheme is secure under q-Simplified Multi-Exponent Bilinear Diffie-Hellman (q-SMEBDH) in the standard model.


2020 ◽  
Vol 89 ◽  
pp. 101658 ◽  
Author(s):  
Joel Höglund ◽  
Samuel Lindemer ◽  
Martin Furuhed ◽  
Shahid Raza

Author(s):  
Yunus Topsakal

The public and private sectors will undergo a significant transformation with the use of blockchain technology, and this potential of blockchain technology will be influential in all areas of life. In addition, blockchain technology can help ease the integration of the Internet of Things, augmented reality, and artificial intelligence applications. The question of how such a technology that is in the process of development will be applied in areas such as taxation, notary operations, and banking, arises simultaneously. Studies related to blockchain technology have mainly been carried out in the fields of finance, logistics, banking, and education. However, there is a paucity of studies on blockchain technology in the tourism industry which has an important role in the global economy. Therefore, the potential of using blockchain technology in the tourism industry is evaluated in this chapter. For this purpose, the features, advantages, and disadvantages of blockchain technology are explained. The potential uses of blockchain technology in the tourism industry are then discussed.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


2019 ◽  
Vol 16 (9) ◽  
pp. 3945-3954
Author(s):  
Priya Oberoi ◽  
Sumit Mittal ◽  
Rajneesh Kumar Gujral

Cloud security is one of the major issues which are affecting the acceptance of Cloud computing (CC). In spite of the number of benefits offered by CC, it also suffers from a myriad of security vulnerabilities. Security is the prime concern while we are accessing the resources from the Cloud through the Internet. This research work is primarily on IAAS (Infrastructure as a service). Here a protocol called Authenticated Routing on Cloud Network (ARCN) has been proposed, to secure the communication route between the client and service provider. The proposed protocol ARCN uses the public key cryptography to mitigate the various security attacks like malicious insider attacks, Spoofing, Falsified routes, DoS, etc.


2021 ◽  
Vol 10 (5) ◽  
pp. 25327-2535
Author(s):  
Dr. K.Nagarathna rajur

It is a modern type of technology that empowers virtual and physical artefacts to interact and provide digitized services for each other, and includes the Internet of Things (IoT). But it has some benefits, but raises problems of single point of failure, anonymity, accountability, and data integrity due to the new structured design. Challenges like these stands in the path of the introduction of all the most interesting Internet of Things technologies. Bringing the Internet of Things through the public ledger might fix these issues. Decentralized ledger systems are comprised of blockchain as well as distributed ledgers. The introduction of the Internet of Things (IoT) to the blockchain will offer tremendous advantages. Blockchain integration in this paper offers a detailed exploration of how to combine the IoT technology with the IoT scheme. It is followed by reviewing the basic framework and addressing the problems inherent in the system's integration, explaining the advantages of it, and describing ways in which the blockchain can help to overcome such problems. Blockchain as a Service for IoT can illustrate how different protocol concepts can be applied using different service types on blockchain. After this, there would be an important section about the integration of artificial intelligence (AI) into the Internet of Things (IoT) and blockchain. Finally, potential study avenues will focus on ways of applying the Internet of Things (IoT) with blockchain are suggested. The open issues and challenges of 5G-enabled IoT for blockchain-based Industrial automation are also analyzed in the text.


Author(s):  
Pranjal Kumar

The growing use of sensor tools and the Internet of Things requires sensors to understand the applications. There are major difficulties in realistic situations, though, that can impact the efficiency of the recognition system. Recently, as the utility of deep learning in many fields has been shown, various deep approaches were researched to tackle the challenges of detection and recognition. We present in this review a sample of specialized deep learning approaches for the identification of sensor-based human behaviour. Next, we present the multi-modal sensory data and include information for the public databases which can be used in different challenge tasks for study. A new taxonomy is then suggested, to organize deep approaches according to challenges. Deep problems and approaches connected to problems are summarized and evaluated to provide an analysis of the ongoing advancement in science. By the conclusion of this research, we are answering unanswered issues and providing perspectives into the future.


2016 ◽  
Vol 65 (2) ◽  
pp. 129-137
Author(s):  
Kazimierz Bęcek

Abstract The Internet of Things (IoT) is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective ‘intelligent’ is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that ‘know’ the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address), which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.


Sign in / Sign up

Export Citation Format

Share Document