JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

05/31/2019
by   Sam Kumar, et al.
0

As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance. Achieving end-to-end encryption for large-scale IoT systems, like smart buildings or smart cities, is challenging because multiple principals typically interact indirectly via intermediaries, meaning that the recipient of a message is not known in advance. This paper proposes JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol for IoT. JEDI encrypts and signs messages end-to-end, while conforming to the decoupled communication model typical of IoT systems. JEDI's keys support expiry and fine-grained access to data, common in IoT. Furthermore, JEDI allows principals to delegate their keys, restricted in expiry or scope, to other principals, thereby granting access to data and managing access control in a scalable, distributed way. Through careful protocol design and implementation, JEDI can run across the spectrum of IoT devices, including ultra low-power deeply embedded sensors severely constrained in CPU, memory, and energy consumption. We apply JEDI to an existing IoT messaging system and demonstrate that its overhead is modest.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/01/2018

A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

The prevalence of Internet of Things (IoTs) allows heterogeneous embedde...
research
07/15/2022

Securing name resolution in the IoT: DNS over CoAP

In this paper, we present the design, implementation, and analysis of DN...
research
06/05/2020

Graph Layer Security: Encrypting Information via Common Networked Physics

The proliferation of low cost Internet of Things (IoT) devices demands n...
research
07/31/2018

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

In the near future, a technological revolution will involve our cities, ...
research
03/30/2020

Increasing negotiation performance at the edge of the network

Automated negotiation has been used in a variety of distributed settings...
research
05/26/2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

The Global Wearable market is anticipated to rise at a considerable rate...
research
09/06/2023

Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations

Narrowband Internet of Things (NB-IoT) is a wireless communication techn...

Please sign up or login with your details

Forgot password? Click here to reset