Visible to the public Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network

TitleAttribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network
Publication TypeConference Paper
Year of Publication2016
AuthorsMalik, Adeel Mohammad, Borgh, Joakim, Ohlman, Börje
Conference NameProceedings of the 3rd ACM Conference on Information-Centric Networking
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4467-8
KeywordsAttribute-Based Encryption (ABE), CCN-lite, Constrained Devices, Content-Centric Network (CCN), Information Centric Networks, Information-Centric Network (ICN), Internet-of-Things (IoT), pubcrawl, Resiliency, RIOT OS, Scalability, Sensor networks

The Information-Centric Networking (ICN) paradigm is drastically different from traditional host-centric IP networking. As a consequence of the disparity between the two, the security models are also very different. The security model for IP is based on securing the end-to-end communication link between the communicating nodes whereas the ICN security model is based on securing data objects often termed as Object Security. Just like the traditional security model, Object security also poses a challenge of key management. This is especially concerning for ICN as data cached in its encrypted form should be usable by several different users. Attribute-Based Encryption (ABE) alleviates this problem by enabling data to be encrypted under a policy that suits several different types of users. Users with different sets of attributes can potentially decrypt the data hence eliminating the need to encrypt the data separately for each type of user. ABE is a more processing intensive task compared to traditional public key encryption methods hence posing a challenge for resource constrained environments with devices that have low memory and battery power. In this demo we show ABE encryption carried out on a resource constrained sensor platform. Encrypted data is transported over an ICN network and is decrypted only by clients that have the correct set of attributes.

Citation Keymalik_attribute-based_2016