End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

被引:0
|
作者
Lin, Shi [1 ]
Cui, Li [2 ]
Ke, Niu [1 ]
机构
[1] Engn Univ PAP, Sch Cryptog Engn, Xian 710000, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Wuhan 430000, Peoples R China
关键词
internet of things; end-to-end encryption; conditional proxy re-encryption; message broker; HiveMQ;
D O I
10.3390/s24020438
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In light of the existing security vulnerabilities within IoT publish-subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking users in previous proxy re-encryption frameworks, but also strengthens data privacy against potential collusion between the broker and subscribers. Through our innovative encryption protocol, unauthorized re-encryption by brokers is effectively prevented, enhancing secure communication between publisher and subscriber. Implemented on HiveMQ, an open-source MQTT platform, our prototype system demonstrates significant enhancements. Comparison to the state-of-the-art end-to-end encryption work, encryption overhead of our scheme is comparable to it, and the decryption cost is approximately half of it. Moreover, our solution significantly improves overall security without compromising the asynchronous communication and decentralized authorization foundational to the publish-subscribe model.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption
    Borcea, Cristian
    Gupta, Arnab Deb
    Polyakov, Yuriy
    Rohloff, Kurt
    Ryan, Gerard
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 71 : 177 - 191
  • [2] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [3] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [4] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [5] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [6] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [7] Highly Efficient Proxy Re-Encryption Schemes for User-End Encrypted Cloud Data Sharing
    Hu, Xing
    Tang, Chunming
    Wong, Duncan S.
    2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 261 - 268
  • [8] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [9] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [10] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110