End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

被引:0
作者
Lin, Shi [1 ]
Cui, Li [2 ]
Ke, Niu [1 ]
机构
[1] Engn Univ PAP, Sch Cryptog Engn, Xian 710000, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Wuhan 430000, Peoples R China
关键词
internet of things; end-to-end encryption; conditional proxy re-encryption; message broker; HiveMQ;
D O I
10.3390/s24020438
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In light of the existing security vulnerabilities within IoT publish-subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking users in previous proxy re-encryption frameworks, but also strengthens data privacy against potential collusion between the broker and subscribers. Through our innovative encryption protocol, unauthorized re-encryption by brokers is effectively prevented, enhancing secure communication between publisher and subscriber. Implemented on HiveMQ, an open-source MQTT platform, our prototype system demonstrates significant enhancements. Comparison to the state-of-the-art end-to-end encryption work, encryption overhead of our scheme is comparable to it, and the decryption cost is approximately half of it. Moreover, our solution significantly improves overall security without compromising the asynchronous communication and decentralized authorization foundational to the publish-subscribe model.
引用
收藏
页数:16
相关论文
共 24 条
  • [1] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [2] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [3] Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
    Yan, Xixi
    Zhang, Jing
    Cheng, Pengyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 83 (01): : 1399 - 1414
  • [4] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [5] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [6] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Sun, Yuxia
    Liu, Dan
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02) : 209 - 215
  • [7] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Yuxia Sun
    Dan Liu
    Mobile Networks and Applications, 2017, 22 : 209 - 215
  • [8] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [9] Internet of Things Security Design Based on Blockchain and Identity Re-encryption
    Yang L.
    Journal of Cyber Security and Mobility, 2024, 13 (03): : 369 - 392
  • [10] Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption
    Chunpeng Ge
    Jiandong Wang
    Liming Fang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 405 - 417