Internet of Things Security Design Based on Blockchain and Identity Re-encryption

被引:0
|
作者
Yang L. [1 ]
机构
[1] College of Artificial Intelligence and Big Data, Zibo Vocational Institute, Zibo
来源
Journal of Cyber Security and Mobility | 2024年 / 13卷 / 03期
关键词
algorithm re-encryption algorithm; blockchain; data security; data sharing; Internet of Things;
D O I
10.13052/jcsm2245-1439.1332
中图分类号
学科分类号
摘要
With the development of IoT technology, IoT devices have penetrated various fields, such as smart homes, industrial automation, healthcare, etc. However, the security issues of IoT devices have always troubled people. Attackers can use various means to attack IoT devices, such as stealing data, tampering with programs, malware infection, etc. These attack methods will bring great losses to users. In response to the above issues, this study uses proxy re-encryption technology to transform data collected by IoT devices into ciphertext. Then, it stores the encrypted IoT data on the blockchain. The combination of blockchain and proxy re-encryption technologies offers a method for the secure sharing of IoT data. The experimental results show that whether the algorithm encrypts a small or large amount of data, the encryption time is relatively short, and the time consumption does not exceed 15 ms. When encrypting 8196 bytes of data, its encryption time is 50% lower than the Attribute-Based Encryption (ABE) algorithm. The proposed IoT data security sharing method has the advantages of high security, fast encryption speed, and good stability, which helps to improve the security performance of the IoT and provides a new approach to IoT security. © 2024 River Publishers.
引用
收藏
页码:369 / 392
页数:23
相关论文
共 50 条
  • [1] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [2] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [3] Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things
    Wang, Fengqun
    Cui, Jie
    Zhang, Qingyang
    He, Debiao
    Gu, Chengjie
    Zhong, Hong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14115 - 14126
  • [4] Enhance the Security of the Cloud Using a Hybrid Optimization-Based Proxy Re-Encryption Technique Considered Blockchain
    Alutaibi, Ahmed I.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (08) : 760 - 771
  • [5] Blockchain data sharing scheme based on quantum re-encryption
    Xie, Sha
    Yan, Lili
    Zhang, Shibin
    Chang, Yan
    Lv, Zhiying
    QUANTUM INFORMATION PROCESSING, 2024, 23 (08)
  • [6] Design of Internet of Things Information Security Based on Blockchain
    Zhang, Jiasheng
    Li, Zetao
    2020 3RD WORLD CONFERENCE ON MECHANICAL ENGINEERING AND INTELLIGENT MANUFACTURING (WCMEIM 2020), 2020, : 114 - 117
  • [7] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273
  • [8] IoT device security based on proxy re-encryption
    SuHyun Kim
    ImYeong Lee
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1267 - 1273
  • [9] Blockchain based Security System for the Devices in Internet of Things
    Sureshkumar, T.
    Vijayakumar, M.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 142 - 145
  • [10] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,