SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks

  title={SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks},
  author={Michele La Manna and Pericle Perazzo and Gianluca Dini},
  journal={J. Inf. Secur. Appl.},
1 Citations

Figures and Tables from this paper

Challenges and Developments in Secure Routing Protocols for Healthcare in WBAN: A Comparative Analysis

This paper has identified the numerous security requirements in WBANs and has provided the extensive review on existing secure routing protocols reported in the literature and a comparative analysis of the various existing state-of-the art security protocols along with different performance parameters has been presented.



On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems

The performance evaluation shows that the adoption of ABE on constrained devices is feasible, although it has a cost that increases with the number of attributes, and highlights how ABE has a significant impact in the lifetime of battery-powered devices, which is impaired significantly when a high number of Attributes is adopted.

Batch-based CP-ABE with attribute revocation mechanism for the Internet of Things

  • Lyes TouatiY. Challal
  • Computer Science
    2015 International Conference on Computing, Networking and Communications (ICNC)
  • 2015
Batch-Based CP-ABE reduces the complexity and the overhead, and does not require extra nodes in the system, and to split time axis into intervals and to send only the necessary key parts to allow refreshing the secrets keys.

fABElous: An Attribute-Based Scheme for Industrial Internet of Things

The Internet of Things (IoT) is a technological vision in which constrained or embedded devices connect together through the Internet. This enables common objects to be empowered with communication

Secure MQTT for Internet of Things (IoT)

A secure version of MQTT and SMQTT-SN protocols are proposed in which security feature is augmented to the existing MQ TT protocol based on Key/Cipher text Policy-Attribute Based Encryption (KP/CP-ABE) using lightweight Elliptic Curve Cryptography.

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

ABE-Cities encrypts data before storing it in the cloud and provides users with keys able to decrypt only those portions of data the user is authorized to access, while ensuring fine-grained access control on data by means of Attribute-Based Encryption (ABE).

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices

A thorough evaluation confirms that adopting attribute-based encryption in the IoT is indeed feasible, considering well-known IoT platforms--specifically, Intel Galileo Gen 2, Intel Edison, Raspberry Pi 1 Model B, and Raspberry Pi Zero.

Server-Aided Revocable Attribute-Based Encryption

This paper proposes a notion called server-aided revocable ABE (SR-ABE), in which almost all workloads of data users incurred by user revocation are delegated to an untrusted server and each data user only needs to store a key of constant size.

An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control

This paper proposes a new CP-ABE scheme that the data owners can fully control their outsourced shared data and resolves the issue of revocation including the entire user access privilege and just partial access right of the user, i.e., a subset of his/her attributes.

Attribute based data sharing with attribute revocation

This paper uniquely integrates the technique of proxy re-encryption with CP-ABE, and enables the authority to delegate most of laborious tasks to proxy servers, and shows that the proposed scheme is provably secure against chosen ciphertext attacks.

On the Feasibility of Attribute-Based Encryption on Smartphone Devices

This paper implemented AndrABEn, an ABE library for Android operating system, and implements two main ABE schemes: Ciphertext-Policy Attribute-Based Encryption, and Key- Policy Attribut-BasedEncryption, confirming the possibility to effectively use ABE on smartphone devices.