JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

被引:0
|
作者
Kumar, Sam [1 ]
Hu, Yuncong [1 ]
Andersen, Michael P. [1 ]
Popa, Raluca Ada [1 ]
Culler, David E. [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance. Achieving end-to-end encryption for large-scale IoT systems, like smart buildings or smart cities, is challenging because multiple principals typically interact indirectly via intermediaries, meaning that the recipient of a message is not known in advance. This paper proposes JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol for IoT. JEDI encrypts and signs messages end-to-end, while conforming to the decoupled communication model typical of IoT systems. JEDI's keys support expiry and fine-grained access to data, common in IoT. Furthermore, JEDI allows principals to delegate their keys, restricted in expiry or scope, to other principals, thereby granting access to data and managing access control in a scalable, distributed way. Through careful protocol design and implementation, JEDI can run across the spectrum of IoT devices, including ultra low-power deeply embedded sensors severely constrained in CPU, memory, and energy consumption. We apply JEDI to an existing IoT messaging system and demonstrate that its overhead is modest.
引用
收藏
页码:1519 / 1536
页数:18
相关论文
共 50 条
  • [1] TCP-friendly many-to-many end-to-end congestion control
    Anker, T
    Dolev, D
    Shnayderman, I
    Sukhov, I
    22ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2003, : 209 - 218
  • [2] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [3] eCat: An End-to-End Model for Multi-Speaker TTS & Many-to-Many Fine-Grained Prosody Transfer
    Abbas, Ammar
    Karlapati, Sri
    Schnell, Bastian
    Karanasou, Penny
    Moya, Marcel Granero
    Nagaraj, Amith
    Boustati, Ayman
    Peinelt, Nicole
    Moinet, Alexis
    Drugman, Thomas
    INTERSPEECH 2023, 2023, : 3387 - 3391
  • [4] An analysis of the end system heterogeneity in many-to-many application layer multicast
    Kang, K
    Kim, S
    Lee, D
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 1025 - 1034
  • [5] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [6] ONE-TO-MANY MULTILINGUAL END-TO-END SPEECH TRANSLATION
    Di Gangi, Mattia A.
    Negri, Matteo
    Turchi, Marco
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 585 - 592
  • [7] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [8] NOVEL KEY MANAGEMENT FOR 3G END-TO-END ENCRYPTION
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    2009 GLOBAL MOBILE CONGRESS, 2009, : 161 - +
  • [9] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [10] END-TO-END VECTOR CORRELATION-FUNCTION IN MANY-CHAIN SYSTEMS
    FREIRE, JJ
    ADACHI, K
    MACROMOLECULES, 1995, 28 (13) : 4747 - 4749