2022 56th Annual Conference on Information Sciences and Systems (CISS) 2022
DOI: 10.1109/ciss53076.2022.9751194
|View full text |Cite
|
Sign up to set email alerts
|

CP-ABE encryption over MQTT for an IoT system with Raspberry Pi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…A new Raspberry Pi kit, recently introduced, is used to invoke recent AI models at small scalability, power consuming, speed, and cost [21]. This new version is Raspberry Pi 4 model B, with 8 GB memory shown in Figure 2.…”
Section: Hardware Components 251 Raspberry Pi 4 Model B and Secure Di...mentioning
confidence: 99%
“…A new Raspberry Pi kit, recently introduced, is used to invoke recent AI models at small scalability, power consuming, speed, and cost [21]. This new version is Raspberry Pi 4 model B, with 8 GB memory shown in Figure 2.…”
Section: Hardware Components 251 Raspberry Pi 4 Model B and Secure Di...mentioning
confidence: 99%
“…Additionally, as the number of attributes increases, the private key's length and the communication delay increase significantly. Mendoza-Cardenas et al [17] intended to evaluate the performance of MQTT with CP-ABE to its adoption in an IoT environment. Wang et al [29] developed a Dual-Policy-Attribute-Based Encryption model (DP-ABE) that allows two access control strategies and ensures high security in cloud scenarios.…”
Section: Imdad Et Al [26]mentioning
confidence: 99%
“…Attribute-Based Encryption (ABE) [15] is commonly used in IoT solutions. However, traditional access control solutions require encryption of IoT data using the Ciphertext Policy-Attribute-Based Encryption (CP-ABE) scheme, and only users who conform to the access control policy can decrypt the encrypted information received [16,17]. ABE schemes usually involve high computational complexity and are challenging to implement in resource-limited wireless sensors with limited power and computational capacity.…”
Section: Introductionmentioning
confidence: 99%