Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update

@article{Manna2021PerformanceEO,
  title={Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update},
  author={Michele La Manna and Luigi Treccozzi and Pericle Perazzo and Sergio Saponara and Gianluca Dini},
  journal={Sensors (Basel, Switzerland)},
  year={2021},
  volume={21}
}
This paper aims to show that it is possible to improve security for over the air update functionalities in an automotive scenario through the use of a cryptographic scheme, called “Attribute-Based-Encryption” (ABE), which grants confidentiality to the software/firmware update done Over The Air (OTA). We demonstrate that ABE is seamlessly integrable into the state of the art solutions regarding the OTA update by showing that the overhead of the ABE integration in terms of computation time and… 

Figures from this paper

ABE Squared: Accurately Benchmarking Efficiency of ABE

TLDR
This work presents a framework, in which ABE schemes can be justifiably optimized and compared by taking into account the possible goals of a designer, and introduces manual, heuristic type-conversion techniques where existing techniques fall short.

Development Of Modules Of Neuro-Like Cryptographic Encryption And Decryption Of Data And Their Implementation On FPGA

The requirements are formed and the main stages of synthesis of cryptological encryption and data decryption modules are explained. The tabular-algorithmic method of scalar product calculation has

Recent Trends on IoT Systems for Traffic Monitoring and for Autonomous and Connected Vehicles

Featured Application Internet of Things, Electronics, Embedded systems, Cyber Physical Systems, Autonomous vehicles, Connected vehicles.

Over-the-Air Programming System for IoT Devices with a Non-native Wireless Update Service

TLDR
This paper presents an Over-the-Air (OTA) programming system for devices that do not natively integrate a wireless update service and shows a reduction in consumption and time required to update an IoT node in both wireless and wired mode.

References

SHOWING 1-10 OF 41 REFERENCES

On the Feasibility of Attribute-Based Encryption on Smartphone Devices

TLDR
This paper implemented AndrABEn, an ABE library for Android operating system, and implements two main ABE schemes: Ciphertext-Policy Attribute-Based Encryption, and Key- Policy Attribut-BasedEncryption, confirming the possibility to effectively use ABE on smartphone devices.

On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems

TLDR
The performance evaluation shows that the adoption of ABE on constrained devices is feasible, although it has a cost that increases with the number of attributes, and highlights how ABE has a significant impact in the lifetime of battery-powered devices, which is impaired significantly when a high number of Attributes is adopted.

STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles

TLDR
Experimental results show that STRIDE significantly reduces the overheads, without compromising the network load and software update retrieval time than the best performed scheme in the state-of-the-art.

Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware

TLDR
This paper compares the advantages and the drawbacks in terms of performance and robustness of such two techniques by means of their integration within the prototype of an IoT middleware, named networked smart object.

Ciphertext-Policy Attribute-Based Encryption

TLDR
A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.

Server-Aided Revocable Attribute-Based Encryption

TLDR
This paper proposes a notion called server-aided revocable ABE (SR-ABE), in which almost all workloads of data users incurred by user revocation are delegated to an untrusted server and each data user only needs to store a key of constant size.

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TLDR
This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

TLDR
ABE-Cities encrypts data before storing it in the cloud and provides users with keys able to decrypt only those portions of data the user is authorized to access, while ensuring fine-grained access control on data by means of Attribute-Based Encryption (ABE).

Secure over-the-air software updates in connected vehicles: A survey