| Literature DB >> 35729898 |
Mahdi R Alagheband1, Atefeh Mashatan1.
Abstract
The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse entities, including smart small devices for capturing sensitive information, which may be attainable targets for malicious parties. Thus security and privacy are of utmost importance. To protect the confidentiality of data handled by IoT devices, conventional cryptographic primitives have generally been used in various IoT security solutions. While these primitives provide just an acceptable level of security, they typically neither preserve privacy nor support advanced functionalities. Also, they overly count on trusted third parties because of some limitations by design. This multidisciplinary survey paper connects the dots and explains how some advanced cryptosystems can achieve ambitious goals. We begin by describing a multi-tiered heterogeneous IoT architecture that supports the cloud, edge, fog, and blockchain technologies and assumptions and capabilities for each layer. We then elucidate advanced encryption primitives, namely wildcarded, break-glass, proxy re-encryption, and registration-based encryption schemes, as well as IoT-friendly cryptographic accumulators. Our paper illustrates how they can augment the features mentioned above while simultaneously satisfying the architectural IoT requirements. We provide comparison tables and diverse IoT-based use cases for each advanced cryptosystem as well as a guideline for selecting the best one in different scenarios and depict how they can be integrated.Entities:
Keywords: Blockchain; Confidentiality; Cryptosystems; Internet of things; Privacy preserving; Security
Year: 2022 PMID: 35729898 PMCID: PMC9188923 DOI: 10.1007/s11227-022-04586-1
Source DB: PubMed Journal: J Supercomput ISSN: 0920-8542 Impact factor: 2.557
The comparison of recent survey articles on security and privacy of IoT with data encryption perspective
| IoT security survey papers | Covered technologies | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| This paper, 2022 | P2P, Edge/Fog, Cloud, Blockchain |
|
|
|
|
| – | - | – | – | – | – | – | – | – | – |
| Zhang [ | P2P, Edge/Fog | – |
| – | – | – |
| – |
| – | – | – | – | – | – | – |
| Wang [ | Blockchain | – | – | – | – |
| – | – | – | – | – | – |
| – | – | – |
| Shrestha [ | Blockchain | – | – | – | – | – |
| – | – | – | – | – | – | – | – | – |
| Harbi [ | Fog, Edge, Blockchain | – | – | – | – | – |
|
|
| – | – | – | – | – | – | – |
| Mousavi [ | Cloud | – | – | – | – | – | – |
|
| – | – |
| – | – | – | – |
| Raikwar [ | Blockchain | – | – | – | – | – | – | – | – |
|
| – | – | – | – |
|
| Noor [ | Cloud, Blockchain | – | – | – | – | – | – |
| – | – | – |
| – | – | – | – |
| Sfar [ | Edge | – | – | – | – | – | – |
| – | – | – |
|
| – | – | – |
| Kouicem [ | P2P | – | – | – | – | – | – |
|
| – | – |
| – |
| – | – |
| Malik [ | P2P | – | – | – | – | – | – |
| – |
| – | – | – | – | – | – |
| Yang [ | P2P | – | – | – | – | – | – |
| - |
| – | – | – | – | – | – |
| Lohachab [ | P2P | – | – | – | – | – | – | – | – | – | – | – | – | – |
| – |
(Enc.: encryption, IBE: Identity-Based Encryption, PKC: Public Key Cryptography, P2P: Peer-to-Peer) (The encryption algorithms: 1—Registration-based Encryption, 2—Proxy Re-Encryption, 3—Wildcarded Encryption, 4—Break-Glass Encryption, 5—Cryptographic Accumulator, 6—Homomorphic Encryption, 7—Conventional public key encryption (RSA, ECC), 8—Attribute-Based Encryption (ABE), 9—Identity-Based Encryption (IBE), 10—Broadcast Encryption, 11—Symmetric Encryption, 12—Hash functions, 13—Signcrption, 14—Post-quantum Encryption, 15—Incremental Encryption)
The list of acronyms
| Acronym | Definition |
|---|---|
| EFCB | Edge-Fog-Cloud-Blockchain |
| Public parameters | |
| Public key | |
| Private key | |
| PRE | Proxy re-encryption |
| CP-APRE | Ciphertext policy attribute-based PRE |
| TTP | Trusted third party |
| KP-APRE | Key policy attribute-based PRE |
| PKG | Private key generator |
| PPRE | Puncturable PRE |
| IBE | Identity-based encryption |
| BPRE | Broadcast PRE |
| WIE | Wildcarded identity-based encryption |
| HPRE | Hybrid PRE |
| DIBE | Downgradable IBE |
| RBE | Registered-based encryption |
| BE | Broadcast encryption |
| PKA | Public key accumulator |
| BGE | Break-glass encryption |
| SXDH | Symmetric eXtended Diffie–Hellman |
| Acc | Accumulator |
| SPoF | Single point of failure |
| PKI | Public key infrastructure |
| TTP | Trusted third party |
Fig. 1The organization of this survey paper (Sections 3 up to 6 have a similar structure)
Fig. 2IoT reference architecture (EFCB-IoT). The synthesis of Edge, Fog, Cloud, and Blockchain technologies with Peer-2-Peer IoT nodes
Fig. 3General diagram of a Proxy Re-Encryption (PRE) primitive
The comparison of IoT-friendly Proxy Re-Encryption primitives (SPoF: Single Point of Failure)
| PRE schemes | Unique feature | Key Escrow free | Decentralized | Collusion resistant | Lightweight | Identity-based | No SPoF | Non-transitive | Bi-direction | Authorization | Revocation |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Dent et al. [ | Hybrid | – | – | – | – | – | – | – | |||
| Jiang et al. [ | Encryption switching | – | - | – | – | – | – | – | – | – | |
| Patil et al. [ | Hierarchical structure | – | – | – | – | – | |||||
| Su et al.[ | Node revocation | – | – | – | – | – | – | – | |||
| Ahene et al. [ | Signcryption-driven | – | – | – | – | – | - | – | – | ||
| Guo et al. [ | Accountability | – | – | – | – | – | – | – | – | ||
| Hou et al. [ | Quantum-resistant | - | – | – | – | – | – | – | – | ||
| Ahene et al. [ | Non-repudiation | – | – | – | – | – | – | – | – | ||
| Koe et al. [ | Offline delegator | – | – | – | – | – | – | – | – | – | – |
| Phuong et al. [ | Puncturable encryption | – | – | – | – | – | – | – | |||
| Chunpeng et al. [ | Broadcasting | – | – | - | – | – | – | – | |||
| Manzoor et al. [ | Blockchain-based | – | – | – | – | – | |||||
| Agyekum et al. [ | Blockchain-based | – | – | – | – | – | – | ||||
| Dutta et al. [ | Quantum-resistant | – | – | – | – | – | – | – |
Fig. 4A schematic diagram of PRE as a proxy converter between different types of cryptographic primitives
Fig. 5The evolutionary process of encryption schemes for one-to-many communication IBE/IE identity-based encryption, HIE hierarchical IE, WIE wildcarded IE, GWIE generalized wildcarded IE, SWIE Scalable wildcarded IE, DIE Downgradable IE, ABE attribute based-encryption, BE broadcast encryption
Comparison of WIEs (SWIE is the fastest one)
| Scheme | Feature | Scalability | Pattern | Ciphertext size |
|---|---|---|---|---|
| WIE [ | Wildcarded | Not-hidden | Variable | |
| GWIE [ | Generalized | Hidden | Variable | |
| SWIE [ | Scalable | Hidden | Constant | |
| DWIE [ | Downgradable | Not-hidden | Constant | |
| SWIE [ | Scalable | Hidden | Constant | |
| WIE [ | Wildcarded | Hidden | Constant |
Fig. 6Untangling the different aspects of cryptographic accumulator
Comparison of registration-based encryption primitives
| Scheme | TTP-Less | Accumulator | Public Verifiability | Best practice | Extra |
|---|---|---|---|---|---|
| RBE [ | Honest | – | –Not efficient | ||
| RBE [ | Honest | Cloud service | +Anonymity | ||
| VRBE [ | Malicious | Blockchain service | +Slightly efficient | ||
| ORBE [ | Honest | – | +Efficient |
Fig. 7The high level structure of registration-based encryption
Fig. 8The conceptual model of the advanced encryption schemes’ use cases in EFCB IoT architecture (PRE proxy re-encryption, WIE wildcarded identity-based encryption, RBE registration-based encryption, BGE break-glass encryption, CAC cryptographic accumulator)
Comparison of the grouped characteristics of the advanced cryptosystems
(Grean: aligned with zero trust environment,
Pink: Compatible with EFCB-IoT structure,
Violet: Supplementary functionality,
Cyan:Privacy-preserving property)
| 1) Nodes lost their keys that they have used for stored ciphertexts encryption. | |
|
| |
| 2) The encryptor node as the only owner of a primary key was destructed and cannot extract the corresponding plaintexts anymore. | |
|
| |
| 3) There was an emergency condition and access to the key for decryption was time-consuming. | |
| (e.g.,it is likely in healthcare systems or critical infrastructures) | |
| | |
| The intermediary storage (Cloud/Fog/Edge) without the primary secret key reveals the plain message only once for a legitimate or a representative user. | |
| |