DOI QR코드

DOI QR Code

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun (IoT Security & Privacy Research Center, Soonchunhyang University) ;
  • Hwang, YongWoon (Department of Computer Software Engineering, Soonchunhyang University) ;
  • Seo, JungTaek (Department of Computer Information Security, Soonchunhyang University)
  • Received : 2017.09.26
  • Accepted : 2018.01.07
  • Published : 2018.02.28

Abstract

Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

Keywords

References

  1. Liu, Zhe, et al. "Reverse product-scanning multiplication and squaring on 8-bit AVR processors," in Proc. of International Conference on Information and Communications Security, Springer International Publishing, 2014.
  2. Ivan, Anca-Andreea, and Yevgeniy Dodis. "Proxy Cryptography Revisited," NDSS. 2003.
  3. Ateniese, Giuseppe, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security (TISSEC) 9.1, pp.1-30, 2006. https://doi.org/10.1145/1127345.1127346
  4. Blaze, Matt, Gerrit Bleumer, and Martin Strauss. "Divertible protocols and atomic proxy cryptography," Advances in Cryptology-EUROCRYPT'98 , pp.127-144, 1998.
  5. Bloom, Burton H, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM 13.7, pp. 422-426, 1970. https://doi.org/10.1145/362686.362692
  6. Raya, Maxim, Panos Papadimitratos, and Jean-Pierre Hubaux. "Securing vehicular communications," IEEE Wireless Communications 13.5 , 2006.
  7. Marimuthu, K., et al. "Scalable and secure data sharing for dynamic groups in cloud," in Proc. of Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on. IEEE, 2014.
  8. Kim, Su-Hyun, and Im-Yeong Lee. "A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in vanets," International Journal of Security and Its Applications 8.2, pp.9-24, 2014, https://doi.org/10.14257/ijsia.2014.8.2.02
  9. Kim, Su-Hyun, and Im-Yeong Lee, "A Secure and Efficient Vehicle-to-Vehicle Communication based on Sensor Network," International Journal of Security and Its Applications 7.6, pp. 241-248, 2013. https://doi.org/10.14257/ijsia.2013.7.6.24
  10. Kar, Jayaprakash, and Banshidhar Majhi. "A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique," in Proc. of Proceedings of the 2011 International Conference on Communication, Computing & Security. ACM, 2011.
  11. Ateniese, Giuseppe, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security (TISSEC) 9.1, pp.1-30, 2006. https://doi.org/10.1145/1127345.1127346
  12. Blaze, Matt, Gerrit Bleumer, and Martin Strauss. "Divertible protocols and atomic proxy Cryptography," Advances in Cryptology-EUROCRYPT'98 , pp. 127-144, 1998.
  13. Maity, S., and J. H. Park. "Powering IoT devices: a novel design and analysis technique," J. Converg 7, pp.1-17, 2016.
  14. Kwon, Taeyean, et al. "Efficiency of LEA compared with AES," JoC6.3, pp.16-25, 2015.
  15. Keegan, Nathan, et al. "A survey of cloud-based network intrusion detection analysis," Human-centric Computing and Information Sciences 6.1, pp.19, 2016. https://doi.org/10.1186/s13673-016-0076-z
  16. X. Lin, X. Sun, P.-H. Ho and X. Shen. "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications," IEEE Trans. on Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, 2007. https://doi.org/10.1109/TVT.2007.906878