Lightweight Encryption for Smart Home

被引:57
作者
Al Salami, Sanaah [1 ]
Baek, Joonsang [1 ]
Salah, Khaled [1 ]
Damiani, Ernesto [1 ]
机构
[1] Khalifa Univ, Informat Secur Res Ctr, Abu Dhabi, U Arab Emirates
来源
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016) | 2016年
关键词
Smart Home; Internet of Things; Security; Identity-Based Encryption; Lightweight Encryption; IoT;
D O I
10.1109/ARES.2016.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart home is one of the most popular IoT (Internet of Things) applications, which connects a wide variety of objects and home appliances in a single logical network. Smart home applications have benefited from interactions and data transmissions among different devices over the integrated network with or without human interventions. However, like other technologies, smart home likely introduces new security vulnerabilities due to its dynamic and open nature of connectivity with heterogeneous features. Among such vulnerabilities, is the breach of confidentiality which needs to be addressed urgently as data exchanged between smart home devices can contain crucial information related to user's privacy and safety. However, some of the challenges in providing smart home system with confidentiality service are the flexibility of key management and efficiency of computation and communication. These challenges should be addressed carefully as many small and resource-constrained devices are usually involved in smart home systems. In this paper, we address these challenges by proposing a lightweight encryption scheme for smart homes. This scheme will provide users and smart objects with confidentiality service without incurring much overhead cost associated with computation and communication. Our proposed scheme also supports flexible public key management through adopting identity-based encryption, which does not require complex certificate handling. We provide a formal security analysis of our scheme and a performance simulation study. The simulation shows that our scheme provides favorable level of efficiency in terms of overhead cost associated with computation and communication.
引用
收藏
页码:382 / 388
页数:7
相关论文
共 17 条
[1]  
[Anonymous], JPAIR QUICK INTRO
[2]  
[Anonymous], 2010, 1 INT WORKSH SEC INT
[3]  
[Anonymous], 2004, P AUSTR UN US GROUP
[4]  
Bellare Mihir., 2006, P 13 ACM C COMPUTER, P380
[5]  
Bhattasali T., LICRYPT LIGHTWEIGHT
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boyen Xavier, 2008, International Journal of Applied Cryptography, V1, P3, DOI 10.1504/IJACT.2008.017047
[8]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[9]  
Han JH, 2015, 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), P1116, DOI 10.1109/ICTC.2015.7354752
[10]  
Jiang L, 2004, PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P659