Cargando…

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †

Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they s...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Yuanyu, Nakanishi, Ruka, Sasabe, Masahiro, Kasahara, Shoji
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8348943/
https://www.ncbi.nlm.nih.gov/pubmed/34372293
http://dx.doi.org/10.3390/s21155053
_version_ 1783735463657340928
author Zhang, Yuanyu
Nakanishi, Ruka
Sasabe, Masahiro
Kasahara, Shoji
author_facet Zhang, Yuanyu
Nakanishi, Ruka
Sasabe, Masahiro
Kasahara, Shoji
author_sort Zhang, Yuanyu
collection PubMed
description Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput.
format Online
Article
Text
id pubmed-8348943
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83489432021-08-08 Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † Zhang, Yuanyu Nakanishi, Ruka Sasabe, Masahiro Kasahara, Shoji Sensors (Basel) Article Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput. MDPI 2021-07-26 /pmc/articles/PMC8348943/ /pubmed/34372293 http://dx.doi.org/10.3390/s21155053 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhang, Yuanyu
Nakanishi, Ruka
Sasabe, Masahiro
Kasahara, Shoji
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title_full Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title_fullStr Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title_full_unstemmed Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title_short Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
title_sort combining iota and attribute-based encryption for access control in the internet of things †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8348943/
https://www.ncbi.nlm.nih.gov/pubmed/34372293
http://dx.doi.org/10.3390/s21155053
work_keys_str_mv AT zhangyuanyu combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings
AT nakanishiruka combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings
AT sasabemasahiro combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings
AT kasaharashoji combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings