1,915
Views
1
CrossRef citations to date
0
Altmetric
SI-Federated Learning for Blockchain Assisted IoT Systems: Architecture, Algorithms, And Applications

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

, &
Pages 2431-2447 | Received 30 Jun 2022, Accepted 11 Sep 2022, Published online: 23 Sep 2022

References

  • Adeel, A., Ali, M., Khan, A. N., Khalid, T., Rehman, F., Jararweh, Y., & Shuja, J. (2022). A multi-attack resilient lightweight IoT authentication scheme. Transactions on Emerging Telecommunications Technologies, 33(3), e3676. https://doi.org/10.1002/ett.3676
  • Alassaf, N., Alkazemi, B., & Gutub, A. (2017). Applicable light-weight cryptography to secure medical data in IoT systems. Journal of Research in Engineering and Applied Sciences (JREAS), 2(2), 50–58. https://doi.org/10.46565/jreas.2017.v02i02.002
  • Alassaf, N., & Gutub, A. (2019). Simulating light-weight-cryptography implementation for IoT healthcare data security applications. International Journal of E-Health and Medical Communications (IJEHMC), 10(4), 1–15. https://doi.org/10.4018/IJEHMC.2019100101.
  • Alassaf, N., Gutub, A., Parah, S. A., & Al Ghamdi, M. (2019). Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimedia Tools and Applications, 78(23), 32633–32657. https://doi.org/10.1007/s11042-018-6801-z
  • Alkhudaydi, M. G., & Gutub, A. A. (2020). Integrating light-weight cryptography with diacritics arabic text steganography improved for practical security applications. Journal of Information Security and Cybercrimes Research, 3(1), 13–30. https://doi.org/10.26735/FMIT1649
  • Chinnasamy, P., Deepalakshmi, P., Dutta, A. K., You, J., & Joshi, G. P. (2022). Ciphertext-Policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system. Mathematics, 10(1), 68. https://doi.org/10.3390/math10010068
  • El Hadj Youssef, W., Abdelli, A., Dridi, F., Brahim, R., & Machhout, M. (2022). An efficient lightweight cryptographic instructions set extension for IoT device security. Security and Communication Networks, 2022, 1–17. https://doi.org/10.1155/2022/9709601
  • Fu, X., Ding, Y., Li, H., Ning, J., Wu, T., & Li, F. (2022). A survey of lattice based expressive attribute-based encryption. Computer Science Review, 43, 100438. https://doi.org/10.1016/j.cosrev.2021.100438
  • Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., & Fang, L. (2022). Revocable attribute-based encryption with data integrity in clouds. IEEE Transactions on Dependable and Secure Computing, 9(5), 2864–2872. https://doi.org/10.1109/TDSC.2021.3065999
  • Guo, L., Yang, X., & Yau, W. C. (2021a). TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access, 9, 8479–8490. https://doi.org/10.1109/ACCESS.2021.3049549
  • Guo, R., Yang, G., Shi, H., Zhang, Y., & Zheng, D. (2021b). O 3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet of Things Journal, 8(11), 8949–8963. https://doi.org/10.1109/JIOT.2021.3055541
  • Hassan, F. S., & Gutub, A. (2021). Efficient image reversible data hiding technique based on interpolation optimization. Arabian Journal for Science and Engineering, 46(9), 8441–8456. https://doi.org/10.1007/s13369-021-05529-3
  • Hu, S., Wang, X., He, H., & Zhong, T. (2022). Complex and flexible data access policy in attribute-based encryption. The Journal of Supercomputing, 78(1), 1010–1029. https://doi.org/10.1007/s11227-021-03867-5
  • Jammula, M., Vakamulla, V. M., & Kondoju, S. K. (2022). Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment. Journal of Interconnection Networks, 2141031. https://doi.org/10.1142/S0219265921410310.
  • Kheshaifaty, N., & Gutub, A. (2021). Engineering graphical captcha and AES crypto hash functions for secure online authentication. Journal of Engineering Research. https://doi.org/10.36909/jer.13761
  • Kumar, A., Ottaviani, C., Gill, S. S., & Buyya, R. (2022a). Securing the future internet of things with post-quantum cryptography. Security and Privacy, 5(2), e200. https://doi.org/10.1002/spy2.200
  • Kumar, V., Kumar, R., Khan, A. A., Kumar, V., Chen, Y. C., & Chang, C. C. (2022b). RAFI: Robust authentication framework for IoT-based RFID infrastructure. Sensors, 22(9), 3110. https://doi.org/10.3390/s22093110
  • La Manna, M., Treccozzi, L., Perazzo, P., Saponara, S., & Dini, G. (2021). Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update. Sensors, 21(2), 515. https://doi.org/10.3390/s21020515
  • Li, H., et al. (2022). "An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things.”. IEEE Journal of Biomedical and Health Informatics, 26(5), 1949–1960. https://doi.org/10.1109/JBHI.2021.3075995
  • Lu, H., Yu, R., Zhu, Y., He, X., Liang, K., & Chu, W. C. C. (2022a). Policy-driven data sharing over attribute-based encryption supporting dual membership. Journal of Systems and Software, 188, 111271. https://doi.org/10.1016/j.jss.2022.111271
  • Lu, X., Fu, S., Jiang, C., & Lio, P. (2021). “A fine-grained IoT data access control scheme combining attribute-based encryption and blockchain.”. Security and Communication Networks, 2021, 5308206. https://doi.org/10.1155/2021/5308206
  • Lu, Z., Guo, Y., Li, J., Jia, W., Lv, L., & Shen, J. (2022b). Novel searchable attribute-based encryption for the internet of things. Wireless Communications and Mobile Computing, 2022, 8350006. https://doi.org/10.1155/2022/8350006.
  • Ming, Y., He, B., & Wang, C. (2021). Efficient revocable multi-authority attribute-based encryption for cloud storage. IEEE Access, 9, 42593–42603. https://doi.org/10.1109/ACCESS.2021.3066212
  • Nayak, M. K., & Swain, P. K. (2022). ESIT: An enhanced lightweight algorithm for secure internet of things. In Iot and analytics for sensor networks (pp. 107–116). Nayak, P., Pal, S., Peng, SL. (eds), Springer, https://doi.org/10.1007/978-981-16-2919-8_10
  • Oberko, P. S. K., Obeng, V.-H. K. S., & Xiong, H. (2022). A survey on multi-authority and decentralized attribute-based encryption. Journal of Ambient Intelligence and Humanized Computing, 13(1), 515–533. https://doi.org/10.1007/s12652-021-02915-5
  • Perazzo, P., Righetti, F., La Manna, M., & Vallati, C. (2021). Performance evaluation of attribute-based encryption on constrained IoT devices. Computer Communications, 170, 151–163. https://doi.org/10.1016/j.comcom.2021.02.012
  • Prakasam, P., Madheswaran, M., Sujith, K. P., & Sayeed, M. S. (2022). Low latency, area and optimal power hybrid lightweight cryptography authentication scheme for internet of things applications. Wireless Personal Communications, 126, 351–365. https://doi.org/10.1007/s11277-022-09748-1
  • Rana, M., Mamun, Q., & Islam, R. (2022). Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems, 129, 77–89. https://doi.org/10.1016/j.future.2021.11.011
  • Rasori, M., La Manna, M., Perazzo, P., & Dini, G. (2022). A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet of Things Journal, 9(11), 8269–8290. https://doi.org/10.1109/JIOT.2022.315403
  • Tu, S., Waqas, M., Huang, F., Abbas, G., & Abbas, Z. H. (2021). A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Computer Networks, 195, 108196. https://doi.org/10.1016/j.comnet.2021.108196
  • Wang, H., Meng, J., Du, X., Cao, T., & Xie, Y. (2022). Lightweight and anonymous mutual authentication protocol for edge IoT nodes with physical unclonable function. Security and Communication Networks. Jan, 4, 2022. https://doi.org/10.1155/2022/1203691.
  • Xiang, X., & Zhao, X. (2022). Blockchain-assisted searchable attribute-based encryption for e-health systems. Journal of Systems Architecture, 124, 102417. https://doi.org/10.1016/j.sysarc.2022.102417
  • Xiong, H., et al. (2021). Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things. IEEE Internet of Things Journal, 9(4), 3097–3111. https://doi.org/10.1109/JIOT.2021.3094323
  • Zeng, P., Zhang, Z., Lu, R., & Choo, K. K. R. (2021). Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet of Things Journal, 8(13), 10963–10972. https://doi.org/10.1109/JIOT.2021.3051362
  • Zhang, Y., Luo, Y., Chen, X., Tong, F., Xu, Y., Tao, J., & Cheng, G. (2022). A lightweight authentication scheme based on consortium blockchain for cross-domain IoT. Security and Communication Networks, 2022(6), 1–15. https://doi.org/10.1155/2022/9686049
  • Zitouni, N., Sedrati, M., & Behaz, A. (2022). Comparing lightweight algorithms to secure constrained objects in internet of things. In Interactive mobile communication, technologies and learning (pp. 1040–1051). In: Auer, M. E., Tsiatsos, T. (eds.) New Realities, Mobile Systems and Applications. Springer.