ESIoT: Enabling Secure Management of the Internet of Things

被引:13
|
作者
Kim, Jun Young [1 ]
Hu, Wen [1 ]
Sarkar, Dilip [2 ]
Jha, Sanjay [1 ]
机构
[1] UNSW Australia, Data61 CSIRO, Sydney, NSW, Australia
[2] Univ Miami, Coral Gables, FL 33124 USA
基金
澳大利亚研究理事会;
关键词
IDENTITY-BASED ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1145/3098243.3098252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an emerging paradigm, where the ubiquitous devices can form the networks and connect to Internet. Security and management of devices remain open challenges for the IoT. We adopt the management framework of industry consortium THREAD, where a group of devices cooperating to accomplish the same task (called policy) are administrated by a designated device called commissioner and together they form a policy group. All these policy groups are further managed by a centralized server. In this hierarchical network structure, the secure distribution of the policy information, access control, and group key from the centralized server to commissioner and its peers become challenging given the pervasive, complex and heterogeneous properties of devices. To solve this, we propose protocols/mechanisms along with a variant of Broadcast Encryption called Secure Identity-Based Broadcast Encryption (SIBBE) and demonstrate the feasibility for secure distribution of information to the IoT devices from centralized server. Most of the related work is based on the Attribute-based Encryption (ABE) for IoT devices, which has scalability issues with the number of attributes. Our experimental and simulation evaluations show that our scheme outperforms the existing schemes in terms of scalability, latency, and communication overhead.
引用
收藏
页码:219 / 229
页数:11
相关论文
共 50 条
  • [1] Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies
    Hamad, Salma Abdalla
    Sheng, Quan Z.
    Zhang, Wei Emma
    Nepal, Surya
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02): : 1372 - 1391
  • [2] Multilevel authentication protocol for enabling secure communication in Internet of Things
    Singh, Khushal
    Singh, Nanhay
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (03):
  • [3] Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies
    Lata, Sonam
    Mehfuz, Shabana
    Urooj, Shabana
    [J]. IEEE ACCESS, 2021, 9 : 161103 - 161128
  • [4] Secure and Efficient Management Architecture for the Internet of Things
    Kim, Jun Young
    [J]. SenSys'15: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015, : 499 - 500
  • [5] Enabling Secure and Traceable Query Services for Internet of Things Using Blockchain
    Yin, Bo
    Xu, Binyao
    Liu, Yihu
    Wang, Tianxu
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 3112 - 3123
  • [6] Enabling the Internet of Things
    Want, Roy
    Schilit, Bill N.
    Jenson, Scott
    [J]. COMPUTER, 2015, 48 (01) : 28 - 35
  • [7] Secure Mobility Management using CoAP in the Internet of Things
    Oryema, Brian
    Lee, Byunghoon
    Park, Jongtae
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 514 - 524
  • [8] Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications
    Zaman, Umar
    Imran
    Mehmood, Faisal
    Iqbal, Naeem
    Kim, Jungsuk
    Ibrahim, Muhammad
    [J]. ELECTRONICS, 2022, 11 (12)
  • [9] Enabling Secure Guest Access for Command-and-Control of Internet of Things Devices
    Poulter, Andrew John
    Cox, Simon J.
    [J]. IOT, 2021, 2 (02): : 236 - 248
  • [10] Cognitive management for the internet of things: A framework for enabling autonomous applications
    [J]. 1600, Institute of Electrical and Electronics Engineers Inc., United States (08):