scholarly journals Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Kai He ◽  
Xueqiao Liu ◽  
Jia-Nan Liu ◽  
Wei Liu

In an identity-based broadcast encryption (IBBE) scheme, the ciphertext is usually appended with a set of user identities to specify intended recipients. However, as IBBE is adopted in extensive industries, the demand of anonymity for specific scenarios such as military applications is urgent and ought no more to be ignored. On the contrary, how to optimize computation and communication is an unavoidable challenge in the IBBE scheme construction, especially in the large-scaled resource-limited wireless networks such as the Internet of Things (IoT), where the cost of computation and communication should be mitigated as much as possible since other functions including connectivity and privacy should be given the top priority. Thus, we present an IBBE scheme from the lattice, in which we employ the Chinese remainder theorem and lattice basis delegation in fixed dimensions to obtain several desirable characteristics, such as constant-size public parameter, private key, and ciphertext. In addition, our encryption and decryption algorithms are more efficient than broadcast encryption (BE) schemes based on number-theoretic problems. To be noticed, our scheme can simultaneously achieve confidentiality and outsider anonymity against the chosen-plaintext attack under the hardness of the learning with error (LWE) problem.

2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Vikas Srivastava ◽  
Sumit Kumar Debnath ◽  
Pantelimon Stǎnicǎ ◽  
Saibal Kumar Pal

<p style='text-indent:20px;'>When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.</p>


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


Author(s):  
R. I. Minu ◽  
G. Nagarajan

In the present-day scenario, computing is migrating from the on-premises server to the cloud server and now, progressively from the cloud to Edge server where the data is gathered from the origin point. So, the clear objective is to support the execution and unwavering quality of applications and benefits, and decrease the cost of running them, by shortening the separation information needs to travel, subsequently alleviating transmission capacity and inactivity issues. This chapter provides an insight of how the internet of things (IoT) connects with edge computing.


2015 ◽  
Vol 2015 (1) ◽  
pp. 000239-000244 ◽  
Author(s):  
Steffen Kroehnert ◽  
José Campos ◽  
André Cardoso ◽  
Eoin O'Toole ◽  
Abel Janeiro ◽  
...  

The next big wave, the Internet of Things or Internet of Everything (IoT/IoE) is on the way. What does that mean for semiconductor packaging, assembly and test? What are the requirements? What solutions can be provided? The market will be wide and fragmented. Many different solutions will be needed. Flexibility and the capability to customize system solutions will be crucial. The fact is, it will be all about smart system integration, integration of sensors, MEMS, connectivity and memory: more functionality on less space in small and thin System-in-Package (SiP) and Package-on-Package (PoP). There will not be one specific packaging technology for IoT/IoE, and no new “IoT/IoE Packaging Technology”. The toolbox is here already, and further features required to meet the needs of future IoT/IoE modules are under development. That is actually good news, as the cost pressure will be high, and materialization of existing manufacturing environment, of mature and yielding packaging technologies will be a key for success.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 634 ◽  
Author(s):  
Xudong Jia ◽  
Ning Hu ◽  
Shen Su ◽  
Shi Yin ◽  
Yan Zhao ◽  
...  

The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroys the autonomy and flexibility of the application system, but also causes issues such as single point of failure and hidden dangers of unilateral control. This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional PKI authentication algorithm. The scheme proposed in this paper implements a decentralized authentication model, which can guarantee the autonomy and initiative of the security domain.


2019 ◽  
Vol 8 (3) ◽  
pp. 2613-2619

The Internet of Things (IoT) technology is the main contributor in numerous smart applications. The reason is because it offers for 24/7 hours of control and maintenance geographically apart, thus reduces labor or manpower cost significantly. The 3 main components for any IoT applications are the source of power (energy), the microcontroller and the sensor (s) involved. Previous issues mainly related to how long the source of power could last for the applications to continue its operation. This paper presents IoT technology for hygiene application to address the utilization of toilet tissue named as Intelligent Tissue Dispenser System (iTDS). The iTDS device relies on the microcontroller and sensor in order to operate the intended task. The microcontroller used is an IoT based device called ESP8266 which is a WiFi-embedded microcontroller that utilized standard everyday WiFi band frequency which is at 2.4 GHz. For the sensor, an ultrasonic distance measurement device is used. The ultrasonic sensor transmit an ultrasonic wave that hit the object to be measured. Upon hitting the surface of the object to be measured, the wave is then reflected to the receiver of the sensor and the time difference between transmitted wave and received wave is calculated to get the actual distance of the object from the sensor. The main contribution of iTDS is to monitor and track for the toilet tissue to be refilled. The implementation shows the iTDS ables to update for the status of each tissue which reducing the cost of manually human checking for tissue refill.


2015 ◽  
Vol 2015 (1) ◽  
pp. 000006-000013 ◽  
Author(s):  
Val R. Marinov

The Internet of Things (IoT) “things” are often times described as active or smart devices and objects augmented with sensing, processing, and network capabilities. These smart objects are in the heart of the IoT concept but they alone cannot realize the full potential of IoT. The most ubiquitous objects in the IoT ecosystem, those that reside at the lowest system level and interact with the higher-level smart object, are based on the passive RFID technology. In the form of wireless passive sensors these objects are found in smart packaging, they form the backbone of the structural health monitoring systems, they provide non-invasive and continuous monitoring of physiological parameters, etc. RFID capability is already added to everyday items in the physical form of adhesive “smart” labels, enabling them to become “citizens” of the IoT ecosystem, but this “add-on“ approach increases the implementation cost and oftentimes impacts negatively the host item's form factor and appearance. It also does very little in terms of security and counterfeit prevention. On the other hand, the key economic factor that drives the deployment of the IoT is the cost at the end points. Therefore, the future of the IoT depends on developing an ultra-low-cost technology solution that can mass-produce low cost, RFID-enabled IoT objects on flexible substrates, ready for integration into everyday items. In some cases, such as in intelligent packaging, these objects will be non-obstructive and seamlessly integrated in their hosts. This integration will minimize the cost of implementation and will provide an insurmountable barrier to counterfeiters as they will need access to sophisticated and capital-intensive technologies in order to be able to alter or replicate the product's embedded configuration. Presented are two disruptive processes for packaging of ultrathin flexible hybrid electronic systems with ICs as thin as 15–20 μm and as small as 250 μm per side. The first generation technology is a modification of the conventional pick-and-place technique and has been already demonstrated on a commercial-grade roll-to-roll assembly line with packaging rates exceeding 10,000 cph. The second generation technology uses a laser beam to scan and transfer ultrathin, ultra-small ICs for high-precision assembly onto various flexible and rigid substrates. It provides packaging rates significantly exceeding those of the conventional pick-and-place equipment. Reported are also results from integrating the resulting ultrathin flexible hybrid electronic devices into thin materials such as paper and plastics.


Author(s):  
Reema Abdulraziq ◽  
Muneer Bani Yassein ◽  
Shadi Aljawarneh

Big data refers to the huge amount of data that is being used in commercial, industrial and economic environments. There are three types of big data; structured, unstructured and semi-structured data. When it comes to discussions on big data, three major aspects that can be considered as its main dimensions are the volume, velocity, and variety of the data. This data is collected, analysed and checked for use by the end users. Cloud computing and the Internet of Things (IoT) are used to enable this huge amount of collected data to be stored and connected to the Internet. The time and the cost are reduced by means of these technologies, and in addition, they are able to accommodate this large amount of data regardless of its size. This chapter focuses on how big data, with the emergence of cloud computing and the Internet of Things (IOT), can be used via several applications and technologies.


Sign in / Sign up

Export Citation Format

Share Document