Limits...
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

Hernández-Ramos JL, Bernabe JB, Moreno MV, Skarmeta AF - Sensors (Basel) (2015)

Bottom Line: This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography.The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities.Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

View Article: PubMed Central - PubMed

Affiliation: Department of Information and Communications Engineering, Computer Science Faculty, University of Murcia, Murcia 30100, Spain. jluis.hernandez@um.es.

ABSTRACT
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

No MeSH data available.


IBE-based Anonymous DCapBAC. Challenge generation performance.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541847&req=5

f6-sensors-15-15611: IBE-based Anonymous DCapBAC. Challenge generation performance.

Mentions: For the IBE-based approach, performance results are primarily influenced by the desired security level, which depends on cryptographic parameters being employed. Specifically, we have made use of the jpair library [19], which has been deployed on the testbed previously described. This library provides an implementation of the Boneh-Franklin (BF) IBE scheme [13] by using type A pairings, which are built on the supersingular curve y2 = x3 + x over the field Fp for some prime p = 3 mod 4. In this case, let p be the prime order of Fp, and E(Fp), the additive group of points of affine coordinates (x, y) with x, y in Fp, that satisfy the curve equation, q represents the order of the cyclic subgroup of interest in E(Fp). Under these assumptions, we used distinct configurations in order to evaluate the performance of this alternative for different security levels. At this point, it should be pointed out that the security level of this stage also depends on other cryptographic material, which is used during the message exchange described in Section 4.2. Consequently, in the case of symmetric and public key cryptographic operations, we used keys according to the IBE parameters, in order to maintain the same security level during the whole process. As stated by [64], the security level of the BF scheme depends on the size of primes p and q. Thus, Figure 6 shows the average delay for the challenge generation step (fluctuating p and q size), corresponding to the delay required to generate the message 10 (EncryptIBE operation), described in Section 4.2. According to the figure, the delay for this task mainly depends on the bits number of p (denoted as /p/).


Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

Hernández-Ramos JL, Bernabe JB, Moreno MV, Skarmeta AF - Sensors (Basel) (2015)

IBE-based Anonymous DCapBAC. Challenge generation performance.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541847&req=5

f6-sensors-15-15611: IBE-based Anonymous DCapBAC. Challenge generation performance.
Mentions: For the IBE-based approach, performance results are primarily influenced by the desired security level, which depends on cryptographic parameters being employed. Specifically, we have made use of the jpair library [19], which has been deployed on the testbed previously described. This library provides an implementation of the Boneh-Franklin (BF) IBE scheme [13] by using type A pairings, which are built on the supersingular curve y2 = x3 + x over the field Fp for some prime p = 3 mod 4. In this case, let p be the prime order of Fp, and E(Fp), the additive group of points of affine coordinates (x, y) with x, y in Fp, that satisfy the curve equation, q represents the order of the cyclic subgroup of interest in E(Fp). Under these assumptions, we used distinct configurations in order to evaluate the performance of this alternative for different security levels. At this point, it should be pointed out that the security level of this stage also depends on other cryptographic material, which is used during the message exchange described in Section 4.2. Consequently, in the case of symmetric and public key cryptographic operations, we used keys according to the IBE parameters, in order to maintain the same security level during the whole process. As stated by [64], the security level of the BF scheme depends on the size of primes p and q. Thus, Figure 6 shows the average delay for the challenge generation step (fluctuating p and q size), corresponding to the delay required to generate the message 10 (EncryptIBE operation), described in Section 4.2. According to the figure, the delay for this task mainly depends on the bits number of p (denoted as /p/).

Bottom Line: This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography.The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities.Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

View Article: PubMed Central - PubMed

Affiliation: Department of Information and Communications Engineering, Computer Science Faculty, University of Murcia, Murcia 30100, Spain. jluis.hernandez@um.es.

ABSTRACT
As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

No MeSH data available.