Performance evaluation of Attribute-Based Encryption on constrained IoT devices*

被引:17
|
作者
Perazzo, Pericle [1 ]
Righetti, Francesca [1 ]
La Manna, Michele [1 ,2 ]
Vallati, Carlo [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Largo Lucio Lazzarino 2, I-56122 Pisa, Italy
[2] Univ Florence, Informat Engn Dept DINFO, Via Santa Marta 3, Florence, Italy
关键词
IoT; Constrained devices; Security; Attribute-based encryption;
D O I
10.1016/j.comcom.2021.02.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is enabling a new generation of innovative services based on the seamless integration of smart objects into information systems. This raises new security and privacy challenges that require novel cryptographic methods. Attribute-Based Encryption (ABE) is a type of public-key encryption that enforces a fine-grained access control on encrypted data based on flexible access policies. The feasibility of ABE adoption in fully-fledged computing systems, i.e., smartphones or embedded systems, has been demonstrated in recent works. In this paper, we consider IoT devices characterized by strong limitations in terms of computing, storage, and power. Specifically, we assess the performance of ABE in typical IoT constrained devices. We evaluate the performance of three representative ABE schemes configured considering the worst-case scenario on two popular IoT platforms, namely ESP32 and RE-Mote. Our results show that, if we assume to employ up to 10 attributes in ciphertexts and to leverage hardware cryptographic acceleration, then ABE can indeed be adopted on devices with very limited memory and computing power, while obtaining a satisfactory battery lifetime. In our experiments, as also performed in other works in the literature, we consider only the worstcase configuration, which, however, might not be completely representative of the real working conditions of sensors employing ABE. For this reason, we complete our evaluation by proposing a novel benchmark method that we used to complement the experiments by evaluating the average performance. We show that by always considering the worst case, the current literature significantly overestimates the processing time and the energy consumption.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 50 条
  • [21] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [22] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [23] Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices
    Su, Ye
    Zhang, Xi
    Qin, Jing
    Ma, Jixin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13945 - 13958
  • [24] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    Mobile Networks and Applications, 2011, 16 : 553 - 561
  • [25] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [26] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [27] Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
    Li, Xiang
    Tian, Hui
    Ning, Jianting
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 347 - 354
  • [28] Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption
    Kanimozhi, P.
    Victoire, T. Aruldoss Albert
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (06)
  • [29] Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT
    Ghopur, Dilxat
    IEEE ACCESS, 2024, 12 : 90840 - 90852
  • [30] Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network
    Malik, Adeel Mohammad
    Borgh, Joakim
    Ohlman, Boerje
    PROCEEDINGS OF THE 2016 3RD ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ACM-ICN '16), 2016, : 217 - 218