2019 IEEE International Conference on Smart Computing (SMARTCOMP) 2019
DOI: 10.1109/smartcomp.2019.00057
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Since then, many researchers have proposed their own schemes, and they evaluated such schemes over various platforms. Moreover, many works have been written that discuss the feasibility of many ABE schemes (both KP-ABE and CP-ABE) on limited-resource devices, like smartphones [ 11 ] and IoT devices [ 10 , 12 ]. However, to the authors’ knowledge, the literature has yet to test the impact of ABE schemes on a real hardware automotive embedded platform.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, many researchers have proposed their own schemes, and they evaluated such schemes over various platforms. Moreover, many works have been written that discuss the feasibility of many ABE schemes (both KP-ABE and CP-ABE) on limited-resource devices, like smartphones [ 11 ] and IoT devices [ 10 , 12 ]. However, to the authors’ knowledge, the literature has yet to test the impact of ABE schemes on a real hardware automotive embedded platform.…”
Section: Related Workmentioning
confidence: 99%
“…Despite that many high-quality works have been published during the years [ 10 , 11 , 12 ] presenting the feasibility of ABE on a wide range of devices, to the authors’ knowledge the literature has not tested the impact of the ABE on a real hardware automotive embedded platform. In this paper, our task is to demonstrate that ABE schemes, in general, are well supported by a platform that is very close to a real ECU mounted on a vehicle.…”
Section: Introductionmentioning
confidence: 99%
“…Overall, previous work in [1]- [3], [11], and [19]- [24] have widely discussed different variations of ABE schemes; however, they have not addressed both mesh network communications and ABE schemes for lightweight implementation on resource-constrained IoT devices. Similarly, other works that deployed ABE schemes for lightweight security in IoT environments are Touati et al [7], Oualha and Nguyen [26], Girgenti et al [8], and Ali et al [27]. However, none of these schemes or the aforementioned works have addressed the topology and architecture of adhoc mesh communication, in which ABE schemes are applied for IoT environments.…”
Section: Related Workmentioning
confidence: 99%
“…The literature has defined resource-constrained devices as of devices limited capabilities in terms of computational power and memory, or unable to perform costly operations, such as encryption operations [7], [8]. Similarly, Kirilline et al [9] have defined resource-constrained devices as devices of restricted memory, processing power, and/or graphical capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…The Encrypt primitive can be executed by any component of the IoT network, because it does not require the knowledge of any secret. It is worth to note that this primitive is computationally demanding, so making its execution challenging for a resource-constrained IoT device [14,15]. This is a reason for adopting an architecture like the NOS one, as detailed in Sect.…”
Section: Cipher-text-policy Attribute-based Encryptionmentioning
confidence: 99%