IoT device security based on proxy re-encryption

被引:3
|
作者
SuHyun Kim
ImYeong Lee
机构
[1] Soonchunhyang University,IoT Security and Privacy Research Center
[2] Soonchunhyang University,Department of Computer Software Engineering
关键词
Internet of things; Lightweight device; Proxy re-encryption; Data sharing;
D O I
暂无
中图分类号
学科分类号
摘要
It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors. IoT, a technology that enables the exchange of data through linkage among all objects surrounding the user, can create new services. Data communication among objects is not limited to personal information, but can also deliver different data types, such as sensing information collected from the surrounding environment. When such data is collected and used maliciously by an attacker, it is more vulnerable to threats than in conventional network environments. Security of all data transmitted in the IoT environment is therefore essential for preventing attacks. However, it is difficult to apply the conventional cipher algorithm to lightweight devices. Therefore, we propose a method for sharing and managing data using the conventional cipher algorithm on lightweight devices in various circumstances. This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.
引用
收藏
页码:1267 / 1273
页数:6
相关论文
共 50 条
  • [41] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [42] On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
    Weng, Jian
    Zhao, Yunlei
    Hanaoka, Goichiro
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 284 - +
  • [43] Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications
    Derler, David
    Krenn, Stephan
    Loruenser, Thomas
    Ramacher, Sebastian
    Slamanig, Daniel
    Striecks, Christoph
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 219 - 250
  • [44] Factoring-Based Proxy Re-Encryption Schemes
    Isshiki, Toshiyuki
    Manh Ha Nguyen
    Tanaka, Keisuke
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 309 - 329
  • [45] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [46] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [47] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [48] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [49] IPRES: In-device Proxy Re-Encryption Service for Secure ICN
    Suksomboon, Kalika
    Tagami, Atsushi
    Basu, Anirban
    Kurihara, Jun
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 176 - 177
  • [50] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223