| Literature DB >> 26140349 |
José L Hernández-Ramos1, Jorge Bernal Bernabe2, M Victoria Moreno3, Antonio F Skarmeta4.
Abstract
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.Entities:
Keywords: Internet of Things; access control; anonymous credential systems; certificateless cryptography; privacy
Year: 2015 PMID: 26140349 PMCID: PMC4541847 DOI: 10.3390/s150715611
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Architectural Reference Model (ARM)-based Security Framework for the Internet of Things (IoT).
Figure 2Architecture and framework interactions of the proposed approach.
Figure 3Identity-Based Encryption (IBE)-based Anonymous DCapBAC interactions.
Figure 4Ciphertext-Policy Attribute-Based Encryption (CP-ABE) based Anonymous DCapBAC interactions.
Figure 5Idemix-based Anonymous DCapBAC interactions.
Figure 6IBE-based Anonymous DCapBAC. Challenge generation performance.
Figure 7IBE-based Anonymous DCapBAC. Challenge resolution performance.
Figure 8CP-ABE based Anonymous DCapBAC. Challenge generation performance.
Figure 9CP-ABE based Anonymous DCapBAC. Challenge resolution performance.
Figure 10Idemix-based Anonymous DCapBAC. Privacy preserving access performance.
Alternatives comparison.
| Once/Until revoked | Once/One per token | Only once/One per token | One per token | Once/Until revoked | Once/Until revoked | |
| Yes | Yes | Yes | No | No | No | |
| No | Yes | Yes | Yes | Yes | Yes | |
| No | Yes | No | No | No | Yes | |
| Yes | No | Yes | Yes | Yes | Yes | |
| No | Variable | Variable | Yes | Yes | Yes | |
| Not applicable | Yes | Yes | Yes | Yes | Yes | |
| Constant | Constant | Constant | Constant | Variable | Constant | |
| 4 | Variable | Variable | 4 | 4 | 6 | |
| Very Low | Medium | Very Low | High | Very High | Low |