Cargando…
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things †
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they s...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8348943/ https://www.ncbi.nlm.nih.gov/pubmed/34372293 http://dx.doi.org/10.3390/s21155053 |
_version_ | 1783735463657340928 |
---|---|
author | Zhang, Yuanyu Nakanishi, Ruka Sasabe, Masahiro Kasahara, Shoji |
author_facet | Zhang, Yuanyu Nakanishi, Ruka Sasabe, Masahiro Kasahara, Shoji |
author_sort | Zhang, Yuanyu |
collection | PubMed |
description | Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput. |
format | Online Article Text |
id | pubmed-8348943 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-83489432021-08-08 Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † Zhang, Yuanyu Nakanishi, Ruka Sasabe, Masahiro Kasahara, Shoji Sensors (Basel) Article Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput. MDPI 2021-07-26 /pmc/articles/PMC8348943/ /pubmed/34372293 http://dx.doi.org/10.3390/s21155053 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhang, Yuanyu Nakanishi, Ruka Sasabe, Masahiro Kasahara, Shoji Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title | Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title_full | Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title_fullStr | Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title_full_unstemmed | Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title_short | Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things † |
title_sort | combining iota and attribute-based encryption for access control in the internet of things † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8348943/ https://www.ncbi.nlm.nih.gov/pubmed/34372293 http://dx.doi.org/10.3390/s21155053 |
work_keys_str_mv | AT zhangyuanyu combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings AT nakanishiruka combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings AT sasabemasahiro combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings AT kasaharashoji combiningiotaandattributebasedencryptionforaccesscontrolintheinternetofthings |