2015
DOI: 10.1016/j.procs.2015.07.208
|View full text |Cite
|
Sign up to set email alerts
|

A Work in Progress: Context based Encryption Scheme for Internet of Things

Abstract: In current Internet, data owners can provide integrity and authentication when data is generated. However confidentiality is usually implemented by symmetric keys between two corresponding programs in an end-to-end manner. A symmetric key for confidentiality is not suitable for Internet of Things (IoT) environment where there are one producer of data and multiple consumers of data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
3

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 4 publications
0
4
0
3
Order By: Relevance
“…In this system, each user's key depends on an access tree structure in which the leaves have the same properties. A user can decrypt text if the encrypted text's attributes correspond to the access tree in his key 11 …”
Section: Conceptsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this system, each user's key depends on an access tree structure in which the leaves have the same properties. A user can decrypt text if the encrypted text's attributes correspond to the access tree in his key 11 …”
Section: Conceptsmentioning
confidence: 99%
“…The decoder can only open encrypted text if its properties apply to the encrypted text access tree. The password with encrypted text policy is very similar to the password with key policy, with the exception that the access tree is encrypted inside the text and the user's attributes are contained in the key 11 …”
Section: Conceptsmentioning
confidence: 99%
“…Este tipo de cifrado puede ser usado en diferentes entornos, como por ejemplo en entornos de Internet of Things (IoT) [4], utilizando diferentes metodologías o con servidores exteriores que comprueben el contexto.…”
Section: Cifrado Basado En Contextounclassified
“…El cifrado basado en contexto para entornos de IoT se puede definir de dos formas [4]: pueden establecerse los datos de contexto en el usuario o pueden establecerse en la propia información a proteger. A continuación se detallan ambos modelos.…”
Section: Cifrado Basado En Contextounclassified
“…С каждым годом количество новых сервисов и устройств на рынке растет экспоненциально [1]. Все больше функций, привычно ранее выполняемых человеком, он переносит на различные устройства с целью облегчить жизнь и более эффективно использовать время.…”
Section: Introductionunclassified