Internet of Things Security Design Based on Blockchain and Identity Re-encryption

被引:0
|
作者
Yang L. [1 ]
机构
[1] College of Artificial Intelligence and Big Data, Zibo Vocational Institute, Zibo
来源
关键词
algorithm re-encryption algorithm; blockchain; data security; data sharing; Internet of Things;
D O I
10.13052/jcsm2245-1439.1332
中图分类号
学科分类号
摘要
With the development of IoT technology, IoT devices have penetrated various fields, such as smart homes, industrial automation, healthcare, etc. However, the security issues of IoT devices have always troubled people. Attackers can use various means to attack IoT devices, such as stealing data, tampering with programs, malware infection, etc. These attack methods will bring great losses to users. In response to the above issues, this study uses proxy re-encryption technology to transform data collected by IoT devices into ciphertext. Then, it stores the encrypted IoT data on the blockchain. The combination of blockchain and proxy re-encryption technologies offers a method for the secure sharing of IoT data. The experimental results show that whether the algorithm encrypts a small or large amount of data, the encryption time is relatively short, and the time consumption does not exceed 15 ms. When encrypting 8196 bytes of data, its encryption time is 50% lower than the Attribute-Based Encryption (ABE) algorithm. The proposed IoT data security sharing method has the advantages of high security, fast encryption speed, and good stability, which helps to improve the security performance of the IoT and provides a new approach to IoT security. © 2024 River Publishers.
引用
收藏
页码:369 / 392
页数:23
相关论文
共 50 条
  • [1] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [2] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [3] Effective Blockchain Assisted Certificateless Proxy Re-encryption Scheme for Medical Internet of Things
    Qi, Xin
    Wu, Shu
    Yu, Shu-Hao
    International Journal of Network Security, 2023, 25 (06) : 992 - 1001
  • [4] Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things
    Wang, Fengqun
    Cui, Jie
    Zhang, Qingyang
    He, Debiao
    Gu, Chengjie
    Zhong, Hong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14115 - 14126
  • [5] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [6] Design of Internet of Things Information Security Based on Blockchain
    Zhang, Jiasheng
    Li, Zetao
    2020 3RD WORLD CONFERENCE ON MECHANICAL ENGINEERING AND INTELLIGENT MANUFACTURING (WCMEIM 2020), 2020, : 114 - 117
  • [7] Identity based Proxy Re-Encryption using Forward Security in Cloud Framework
    Bankar, Jaitee
    Raghatwan, Jyoti
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [8] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [9] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [10] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +