Securing Multicast Group Communication in IoT-Enabled Systems

被引:8
作者
Basu, Subho Shankar [1 ]
Tripathy, Somanath [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci, Patna, Bihar, India
关键词
Attribute-based encryption; Internet of Things; IoT security protocols; Multicast security; Resource-constrained devices; INTERNET; THINGS;
D O I
10.1080/02564602.2017.1407681
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current trend is being extended from the traditional Internet to the small, cheap, and low-power Internet of Things (IoT) in which the objects are being equipped with a device having computation and communication capabilities. As a result, all these objects can be connected to the Internet and have the capability to communicate among each other. This connection infrastructure among the objects would face different types of malicious attacks. Hence securing these objects is a primary goal. There are a lot of security mechanisms available today, but most of them are quite heavy in terms of computation and communication. As the IoT objects have very limited resources and mostly run on battery power, it is difficult to embed intensive computations on these resource-constrained devices. Datagram Transport Layer Security (DTLS) protocol has been standardized to work in cohesion with the CoAP protocol to provide security. But DTLS does not fit well for multicasting, though it is a quite common need for IoT environments. Indeed there are some adaptations for DTLS protocol to function in a multicast environment, but it consumes much communication and computation resources. We propose a mechanism called S-CPABE (Segregated Ciphertext Policy Attribute-Based Encryption) based on CPABE, particularly targeting the multicast needs and tailoring to the IoT framework. The novelty of S-CPABE lies on providing equivalent security as CPABE with reduced resource requirements at the low-power end devices. This mechanism perfectly meets the needs for secure multicast in an IoT environment and consumes much less resources as compared to DTLS.
引用
收藏
页码:83 / 93
页数:11
相关论文
共 22 条
[1]  
[Anonymous], 2013, TINYDTLS
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]  
Cheung L., 2007, GROUP ORIENTED CRYPT, P23
[6]   Energy-aware Security in M-Commerce and the Internet of Things [J].
Hamad, Fadi ;
Smalov, Leonid ;
James, Anne .
IETE TECHNICAL REVIEW, 2009, 26 (05) :357-362
[7]   Security Challenges in the IP-based Internet of Things [J].
Heer, Tobias ;
Garcia-Morchon, Oscar ;
Hummen, Rene ;
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Wehrle, Klaus .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :527-542
[8]   ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks [J].
Huang, Dijiang ;
Verma, Mayank .
AD HOC NETWORKS, 2009, 7 (08) :1526-1535
[9]  
Keoh S., 2012, IN PRESS
[10]   Securing the Internet of Things: A Standardization Perspective [J].
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Tschofenig, Hannes .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03) :265-275