2021
DOI: 10.1109/access.2020.3048192
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices

Abstract: Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly sensitive data, adapting scalable and flexible communication with efficient security is vital. Research investigated wireless Ad-hoc/mesh networking, while Attribute Based Encryption (ABE) schemes have been highly recommended for IoT. However, a combined implementation of both mesh networkin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Recalling the typical architecture of the IoT systems that encompasses Low-power Lossy (sensor) Networks (LLNs), gateways, transmission channel and data-warehouses or storage possessing undeniably security related vulnerabilities. Typically, the poorly interfaced nature of IoT devices and their inferior connection, especially operating online can undergo 377 | P a g e www.ijacsa.thesai.org security breaches and resulting losses [5][6][7]. On the other hand, attack probability gets increased manifolds over channel where different man-in-the middle attack (MITM), linear and differential attacks, impersonation, etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recalling the typical architecture of the IoT systems that encompasses Low-power Lossy (sensor) Networks (LLNs), gateways, transmission channel and data-warehouses or storage possessing undeniably security related vulnerabilities. Typically, the poorly interfaced nature of IoT devices and their inferior connection, especially operating online can undergo 377 | P a g e www.ijacsa.thesai.org security breaches and resulting losses [5][6][7]. On the other hand, attack probability gets increased manifolds over channel where different man-in-the middle attack (MITM), linear and differential attacks, impersonation, etc.…”
Section: Introductionmentioning
confidence: 99%
“…are more common. Similarly, once compromising the security access level of IoT devices due to poorly configured setup or keys, an intruder can manipulate the device and its functioning, thus obstructing overall performance [7]. However, looking into depth it can be found the key reason behind such attack possibility is poor encryption systems with limited keying capacity and inferior cipher-space [8].…”
Section: Introductionmentioning
confidence: 99%