Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms
Author | Hijawi, Ula |
Author | Unal, Devrim |
Author | Hamila, Ridha |
Author | Gastli, Adel |
Author | Ellabban, Omar |
Available date | 2022-11-23T11:25:32Z |
Publication Date | 2020 |
Publication Name | 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020 |
Resource | Scopus |
Resource | 2-s2.0-85085515477 |
Abstract | Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' behavioral patterns, which necessitates the need of safe data communication. IoT distributed systems are incurred with cyber-security challenges that need to be considered for lightweight heterogonous devices. Attribute-Based Encryption (ABE) schemes have been proposed to provide secure data communication between networked devices in unsecure channels by specifying an access policy to be solely verified when a set of attributes of the decrypting user satisfies the access policy. Primitives based on elliptic curves, on the other hand, provide much smaller key bit sizes than other cryptographic algorithms at the same security strength. Several state-of-the-art works have introduced no-pairing ABE schemes that eliminate the need of the computationally expensive bilinear pairing operations, but few have implemented no-pairing ECC-based ABE schemes on resource-constrained platforms for IoT applications. In this paper, a no-pairing ECC-based KPABE scheme is implemented on different IoT platforms of constrained computing capabilities. The performance evaluation in terms of time execution against increasing number of attributes is presented and benchmarked with the scheme's implementation on a computer. The presented implementation provides an aid for future IoT deployments to adopt the optimal platform solution of the proposed implementation IoT platforms. 2020 IEEE. |
Sponsor | ACKNOWLEDGMENT This publication was made possible by National Priority Research Program (NPRP) grant [NPRP10-1203-160008] from the Qatar National Research Fund (a member of Qatar Foundation) and the co-funding by IBERDROLA QSTP LLC. The findings achieved herein are solely the responsibility of the authors. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | attribute-based encryption constrained-resources cybersecurity elliptic curves internet of things |
Type | Conference |
Pagination | 225-230 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Electrical Engineering [2685 items ]
-
Information Intelligence [93 items ]