IoT device security based on proxy re-encryption

被引:3
|
作者
SuHyun Kim
ImYeong Lee
机构
[1] Soonchunhyang University,IoT Security and Privacy Research Center
[2] Soonchunhyang University,Department of Computer Software Engineering
关键词
Internet of things; Lightweight device; Proxy re-encryption; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
引用
收藏
页码:1267 / 1273
页数:6
相关论文
共 50 条
  • [1] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273
  • [2] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [3] On the security model for proxy re-encryption
    Wang, Xu'an
    Yang, Xiaoyuan
    Zhang, Minqing
    Du, Xiaoni
    Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958
  • [4] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [5] Proxy Re-encryption Schemes for IoT and Crowd Sensing
    Diaz-Sanchez, Daniel
    Sherratt, R. Simon
    Arias, Patricia
    Almenares, Florina
    Lopez, Andres Marin
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
  • [6] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [7] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [8] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
  • [9] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [10] Secure Multicast using Proxy Re-Encryption in an IoT Environment
    Kim, SuHyun
    Hwang, YongWoon
    Seo, JungTaek
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 946 - 959