2022
DOI: 10.1109/jiot.2022.3154039
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things

Abstract: The Internet of Things (IoT) is an information service paradigm based on the integration of smart objects, mobile devices, and computers via the Internet. IoT technologies are key enablers for a multitude of applications in diverse fields, such as digital health, smart city, industrial automation, and supply chain. This raises new security and privacy challenges that can be addressed by advanced cryptographic methods. One of the most prominent is attribute-based encryption (ABE), which allows one to encrypt da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(21 citation statements)
references
References 89 publications
0
11
0
Order By: Relevance
“…However, in an IoT environment with high traffic and many participating entities, such a key management method is undoubtedly very complicated. To lessen the difficulties of key management on the one hand and provide fine-grained access control to encrypted data on the other, we intend to add attribute-based encryption [ 51 ] in future work.…”
Section: Discussionmentioning
confidence: 99%
“…However, in an IoT environment with high traffic and many participating entities, such a key management method is undoubtedly very complicated. To lessen the difficulties of key management on the one hand and provide fine-grained access control to encrypted data on the other, we intend to add attribute-based encryption [ 51 ] in future work.…”
Section: Discussionmentioning
confidence: 99%
“…Pu et al [ 4 ] introduced a public key authentication encryption scheme, and added the function of keyword search into this scheme to guarantee IoT data security in industrial IoT applications. Rasori et al [ 5 ] provided a survey of the attributed-based encryption protocols in recent years, and figured out the problems and challenges of IoT data fine-grained access control in most current IoT applications. Onyema et al [ 6 ] presented a security policy protocol for the detection and prevention of Internet control message protocol (ICMP) attacks in software-defined networks.…”
Section: Related Workmentioning
confidence: 99%
“…For secure IoT data transmission, the digital signature can help confirm data ownership [ 2 ], the key agreement can help establish a secure session key [ 3 ], and the public key encryption can guarantee IoT data security with ciphertext in the public Internet environment [ 4 ]. For IoT data with fine-grained access control, attribute-based encryption can help establish a secure access control strategy with the attributes of IoT users and data [ 5 ], and security policy protocol can solve Internet control message protocol (ICMP) attacks [ 6 ]. Many cryptographic algorithms guarantee secure and efficient communication among different IoT applications—there are too many to mention one by one.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, existing agricultural product traceability systems typically use attribute-based encryption algorithms [ 27 ] to control data access permissions to protect the privacy and trade secrets of various enterprises [ 28 , 29 , 30 ]. In traditional blockchain-based agricultural product data management systems, due to the immutability of blockchains, data access permissions cannot be changed once uploaded, which is not conducive to the flexible control of access permissions.…”
Section: Introductionmentioning
confidence: 99%