skip to main content
10.1145/2984356.2985229acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
demonstration

Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network

Published: 26 September 2016 Publication History

Abstract

The Information-Centric Networking (ICN) paradigm is drastically different from traditional host-centric IP networking. As a consequence of the disparity between the two, the security models are also very different. The security model for IP is based on securing the end-to-end communication link between the communicating nodes whereas the ICN security model is based on securing data objects often termed as Object Security. Just like the traditional security model, Object security also poses a challenge of key management. This is especially concerning for ICN as data cached in its encrypted form should be usable by several different users. Attribute-Based Encryption (ABE) alleviates this problem by enabling data to be encrypted under a policy that suits several different types of users. Users with different sets of attributes can potentially decrypt the data hence eliminating the need to encrypt the data separately for each type of user. ABE is a more processing intensive task compared to traditional public key encryption methods hence posing a challenge for resource constrained environments with devices that have low memory and battery power. In this demo we show ABE encryption carried out on a resource constrained sensor platform. Encrypted data is transported over an ICN network and is decrypted only by clients that have the correct set of attributes.

References

[1]
Ericsson Mobility Report, June 2016.
[2]
V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data, In ACM conference on Computer and Communications Security (ACM CCS), 2006.
[3]
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-Policy Attribute-Based Encryption, In: IEEE Symposium on Security and Privacy, pp. 321-334 (2007).
[4]
M. Chase, S.M. Chow, Improving privacy and security in multi-authority attribute-based encryption, ACM conference on Computer and communications security (CCS 2009), pp. 121–130. ACM, New York (2009).
[5]
A. Lewko, B. Waters, Decentralizing Attribute-Based Encryption, Cryptology ePrint Archive Report 2010/351 (2010), http://eprint.iacr.org/
[6]
M. Ambrosin, M. Conti, T. Dargahi, On the Feasibility of Attribute-Based Encryption on Smartphone Devices, arXiv:1504.00619
[7]
RIOT OS for the Internet-of-Things, https://www.riot-os.org/
[8]
CCN-lite: Lightweight implementation of the CCNx protocol of XEROX PARC, http://www.ccn-lite.net/

Cited By

View all
  • (2024)ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT EnvironmentIEEE Transactions on Network and Service Management10.1109/TNSM.2024.341943121:5(5826-5842)Online publication date: Oct-2024
  • (2023)End-to-End Encryption in Resource-Constrained IoT DeviceIEEE Access10.1109/ACCESS.2023.329282911(70040-70051)Online publication date: 2023
  • (2021)Attribute-based encryption for named data networkingProceedings of the 8th ACM Conference on Information-Centric Networking10.1145/3460417.3483371(118-120)Online publication date: 22-Sep-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
September 2016
275 pages
ISBN:9781450344678
DOI:10.1145/2984356
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2016

Check for updates

Author Tags

  1. Attribute-Based Encryption (ABE)
  2. CCN-lite
  3. Constrained Devices
  4. Content-Centric Network (CCN)
  5. Information-Centric Network (ICN)
  6. Internet-of-Things (IoT)
  7. RIOT OS
  8. Sensor Networks

Qualifiers

  • Demonstration

Conference

ICN'16
Sponsor:

Acceptance Rates

ACM-ICN '16 Paper Acceptance Rate 23 of 84 submissions, 27%;
Overall Acceptance Rate 133 of 482 submissions, 28%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT EnvironmentIEEE Transactions on Network and Service Management10.1109/TNSM.2024.341943121:5(5826-5842)Online publication date: Oct-2024
  • (2023)End-to-End Encryption in Resource-Constrained IoT DeviceIEEE Access10.1109/ACCESS.2023.329282911(70040-70051)Online publication date: 2023
  • (2021)Attribute-based encryption for named data networkingProceedings of the 8th ACM Conference on Information-Centric Networking10.1145/3460417.3483371(118-120)Online publication date: 22-Sep-2021
  • (2021)An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT EnvironmentIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30762098:5(1108-1120)Online publication date: Oct-2021
  • (2020)COPSS-lite: A Lightweight ICN based Pub/Sub System for IoT Environments2020 16th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN50589.2020.00034(121-128)Online publication date: Dec-2020
  • (2019)NDN-ABSProceedings of the 6th ACM Conference on Information-Centric Networking10.1145/3357150.3357393(123-133)Online publication date: 24-Sep-2019
  • (2019)A survey of Internet of Things communication using ICNComputer Communications10.1016/j.comcom.2019.05.010142:C(95-123)Online publication date: 15-Jun-2019
  • (2018)Attribute Based Content Security and Caching in Information Centric IoTProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3233273(1-8)Online publication date: 27-Aug-2018
  • (2017)Solutions for inter-connectivity and security in a smart hospital building2017 IEEE 15th International Conference on Industrial Informatics (INDIN)10.1109/INDIN.2017.8104766(174-179)Online publication date: Jul-2017
  • (2017)Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context2017 Global Internet of Things Summit (GIoTS)10.1109/GIOTS.2017.8016277(1-6)Online publication date: Jun-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media