End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

被引:0
|
作者
Lin, Shi [1 ]
Cui, Li [2 ]
Ke, Niu [1 ]
机构
[1] Engn Univ PAP, Sch Cryptog Engn, Xian 710000, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Wuhan 430000, Peoples R China
关键词
internet of things; end-to-end encryption; conditional proxy re-encryption; message broker; HiveMQ;
D O I
10.3390/s24020438
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In light of the existing security vulnerabilities within IoT publish-subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking users in previous proxy re-encryption frameworks, but also strengthens data privacy against potential collusion between the broker and subscribers. Through our innovative encryption protocol, unauthorized re-encryption by brokers is effectively prevented, enhancing secure communication between publisher and subscriber. Implemented on HiveMQ, an open-source MQTT platform, our prototype system demonstrates significant enhancements. Comparison to the state-of-the-art end-to-end encryption work, encryption overhead of our scheme is comparable to it, and the decryption cost is approximately half of it. Moreover, our solution significantly improves overall security without compromising the asynchronous communication and decentralized authorization foundational to the publish-subscribe model.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] Conditional Identity-Based Broadcast Proxy Re-Encryption With Anonymity and Revocation
    Chen, Liqing
    Zhang, Meng
    Li, Jiguo
    IEEE TRANSACTIONS ON RELIABILITY, 2025,
  • [23] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [24] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Sun, Yuxia
    Liu, Dan
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02): : 209 - 215
  • [25] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [26] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Yuxia Sun
    Dan Liu
    Mobile Networks and Applications, 2017, 22 : 209 - 215
  • [27] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [28] Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems
    Li, Wenchao
    Jin, Chuanjie
    Kumari, Saru
    Xiong, Hu
    Kumar, Sachin
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
  • [29] Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things
    Wang, Fengqun
    Cui, Jie
    Zhang, Qingyang
    He, Debiao
    Gu, Chengjie
    Zhong, Hong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14115 - 14126
  • [30] Internet of Things Security Design Based on Blockchain and Identity Re-encryption
    Yang L.
    Journal of Cyber Security and Mobility, 2024, 13 (03): : 369 - 392