File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/GIOTS.2017.8016277
- Scopus: eid_2-s2.0-85029332545
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context
Title | Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context |
---|---|
Authors | |
Issue Date | 2017 |
Citation | GIoTS 2017 - Global Internet of Things Summit, Proceedings, 2017 How to Cite? |
Abstract | © 2017 IEEE. Attribute-Based Encryption (ABE) is considered to be one of the most promising ways to be enforce access control in Information-Centric Networking (ICN). As the Internet of Things (IoT) is being considered as one of the primary use cases for ICN it raises the question of the compatibility between IoT and ABE. An important part of the IoT is the resource constrained devices, for them there is a challenge to perform the computationally expensive operations required for ABE. In this paper we consider ABE in sensor networks and discuss the strengths and weaknesses of a system solution where the ABE operations are performed on the sensors. To properly discuss these concerns we have implemented two ABE schemes, a Single-authority ABE (SA-CP-ABE) scheme and a Multi-authority ABE (MA-CP-ABE) scheme. Results regarding the execution time, RAM usage, data overhead and battery consumption of these implementations on a sensor are presented. We conclude that it is possible, already today, to perform ABE on sensors for smaller policies. The main limitation in deploying ABE in sensors is the RAM size of the sensors. |
Persistent Identifier | http://hdl.handle.net/10722/281472 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Borgh, Joakim | - |
dc.contributor.author | Ngai, Edith | - |
dc.contributor.author | Ohlman, Borje | - |
dc.contributor.author | Malik, Adeel Mohammad | - |
dc.date.accessioned | 2020-03-13T10:37:57Z | - |
dc.date.available | 2020-03-13T10:37:57Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | GIoTS 2017 - Global Internet of Things Summit, Proceedings, 2017 | - |
dc.identifier.uri | http://hdl.handle.net/10722/281472 | - |
dc.description.abstract | © 2017 IEEE. Attribute-Based Encryption (ABE) is considered to be one of the most promising ways to be enforce access control in Information-Centric Networking (ICN). As the Internet of Things (IoT) is being considered as one of the primary use cases for ICN it raises the question of the compatibility between IoT and ABE. An important part of the IoT is the resource constrained devices, for them there is a challenge to perform the computationally expensive operations required for ABE. In this paper we consider ABE in sensor networks and discuss the strengths and weaknesses of a system solution where the ABE operations are performed on the sensors. To properly discuss these concerns we have implemented two ABE schemes, a Single-authority ABE (SA-CP-ABE) scheme and a Multi-authority ABE (MA-CP-ABE) scheme. Results regarding the execution time, RAM usage, data overhead and battery consumption of these implementations on a sensor are presented. We conclude that it is possible, already today, to perform ABE on sensors for smaller policies. The main limitation in deploying ABE in sensors is the RAM size of the sensors. | - |
dc.language | eng | - |
dc.relation.ispartof | GIoTS 2017 - Global Internet of Things Summit, Proceedings | - |
dc.title | Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/GIOTS.2017.8016277 | - |
dc.identifier.scopus | eid_2-s2.0-85029332545 | - |
dc.identifier.spage | null | - |
dc.identifier.epage | null | - |