Performance evaluation of Attribute-Based Encryption on constrained IoT devices*

被引:17
|
作者
Perazzo, Pericle [1 ]
Righetti, Francesca [1 ]
La Manna, Michele [1 ,2 ]
Vallati, Carlo [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, Largo Lucio Lazzarino 2, I-56122 Pisa, Italy
[2] Univ Florence, Informat Engn Dept DINFO, Via Santa Marta 3, Florence, Italy
关键词
IoT; Constrained devices; Security; Attribute-based encryption;
D O I
10.1016/j.comcom.2021.02.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is enabling a new generation of innovative services based on the seamless integration of smart objects into information systems. This raises new security and privacy challenges that require novel cryptographic methods. Attribute-Based Encryption (ABE) is a type of public-key encryption that enforces a fine-grained access control on encrypted data based on flexible access policies. The feasibility of ABE adoption in fully-fledged computing systems, i.e., smartphones or embedded systems, has been demonstrated in recent works. In this paper, we consider IoT devices characterized by strong limitations in terms of computing, storage, and power. Specifically, we assess the performance of ABE in typical IoT constrained devices. We evaluate the performance of three representative ABE schemes configured considering the worst-case scenario on two popular IoT platforms, namely ESP32 and RE-Mote. Our results show that, if we assume to employ up to 10 attributes in ciphertexts and to leverage hardware cryptographic acceleration, then ABE can indeed be adopted on devices with very limited memory and computing power, while obtaining a satisfactory battery lifetime. In our experiments, as also performed in other works in the literature, we consider only the worstcase configuration, which, however, might not be completely representative of the real working conditions of sensors employing ABE. For this reason, we complete our evaluation by proposing a novel benchmark method that we used to complement the experiments by evaluating the average performance. We show that by always considering the worst case, the current literature significantly overestimates the processing time and the energy consumption.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 50 条
  • [31] Attribute-Based Symmetric Searchable Encryption
    Dang, Hai-Van
    Ullah, Amjad
    Bakas, Alexandros
    Michalas, Antonis
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 318 - 336
  • [32] Attribute-based encryption with adaptive policy
    Yiliang Han
    Soft Computing, 2019, 23 : 4009 - 4017
  • [33] Online/Offline Attribute-Based Encryption
    Hohenberger, Susan
    Waters, Brent
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 293 - 310
  • [34] Attribute-Based Encryption with Personalized Search
    Zhang, Qiang
    Wang, Guojun
    Liu, Qin
    Peng, Tao
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1172 - 1178
  • [35] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [36] Targeted Homomorphic Attribute-Based Encryption
    Brakerski, Zvika
    Cash, David
    Tsabary, Rotem
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 330 - 360
  • [37] Unbounded HIBE and Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 547 - 567
  • [38] Attribute-Based Encryption for Circuits on Lattices
    Zhao, Jian
    Gao, Haiying
    Zhang, Junqi
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 463 - 469
  • [39] On the Decentralization of Attribute-Based Encryption Schemes
    Hinojosa-Cabello, Melissa Brigitthe
    Aldeco-Perez, Rocio Alejandra
    Morales-Sandoval, Miguel
    Garcia-Hernandez, Jose Juan
    2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [40] Attribute-Based Encryption for Range Attributes
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Ogawa, Kazuto
    Ohtake, Go
    Watanabe, Hajime
    Yamada, Shota
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 42 - 61