Skip to main content

Attribute-Based Encryption for the Internet of Things: A Review

  • Conference paper
  • First Online:
Communication and Intelligent Systems (ICCIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 968))

Included in the following conference series:

  • 23 Accesses

Abstract

The study attempts to do a thorough analysis of existing research papers, conference papers, and other pertinent publications related to Attribute-Based Encryption for IoT. Due to the variety and dynamism of connected devices and data, the Internet of Things (IoT) poses new security issues. With the aim of safeguarding IoT environments, the advanced cryptography technique Attribute-Based Encryption (ABE) facilitates fine-grained access control according to certain attributes. Traditional access control strategies frequently rely on user identities or roles, which in some circumstances can be rigid and difficult to manage. These restrictions are addressed by Attribute-Based Encryption (ABE), which allows access to data depending on certain attributes. In-depth analysis of ABE in the context of IoT is provided in this paper, starting with its foundational ideas. The review employs to locate, choose, and study the literature while providing insights into security challenges, importance of access control, ABE variants and applicability for IoT, ABE security models, ABE libraries or frameworks, and conclusion with potential future directions. This review is useful for researchers or academicians working in the field of IoT security using ABE scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hersent O, David B, Omar E (2011) The internet of things: key applications and protocols. https://doi.org/10.1002/9781119958352

  2. Perera C, Liu CH, Jayawardena S, Chen M (2015) A survey on the internet of things from an industrial market perspective. IEEE Access 2:1660–1679. https://doi.org/10.1109/ACCESS.2015.2389854

    Article  Google Scholar 

  3. Nasiraee H, Ashouri-Talouki M (2020) Anonymous decentralized attribute-based access control for cloud-assisted IoT. Futur Gener Comput Syst 110:45–56. https://doi.org/10.1016/j.future.2020.04.011

    Article  Google Scholar 

  4. Görmüş S, Aydın H, Ulutaş G (2018) Security for the internet of things: a survey of existing mechanisms, protocols and open research issues. J Fac Eng Architect Gazi Univ 33(4):1247–1272

    Google Scholar 

  5. Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2016) Internet of things (IoT) security: current status, challenges and prospective measures”. 2015 10th international conference for internet technology and secured transactions. ICITST 2015:336–341. https://doi.org/10.1109/ICITST.2015.7412116

    Article  Google Scholar 

  6. Han Y (2019) Attribute-based encryption with adaptive policy. Soft Comput 23:4009–4017. https://doi.org/10.1007/s00500-018-3370-z

    Article  Google Scholar 

  7. Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Advances in cryptology—Eurocrypt, vol 3494 of LNCS, Springer, pp 457–473

    Google Scholar 

  8. Vipul G, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on computer and communications security, pp 89–98. https://doi.org/10.1145/1180405.1180418

  9. Attrapadung N, Herranz J, Laguillaumie F, Libert B, De Panafieu E, Ràfols C (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theoret Comput Sci 422:15–38. https://doi.org/10.1016/j.tcs.2011.12.004

    Article  MathSciNet  Google Scholar 

  10. Bethencourt J, Amit S, Brent W (2007) Ciphertext-policy attribute-based encryption. In: Proceedings—IEEE symposium on security and privacy, pp 321–334. https://doi.org/10.1109/SP.2007.11

  11. Balu A, Kuppusamy K (2014) An expressive and provably secure ciphertext-policy attribute-based encryption. Inform Sci 276(subaward 641):354–362. https://doi.org/10.1016/j.ins.2013.12.027.

  12. Shruti SR, Sah DK, Gianini G (2023) Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey. Sensors 23(13):5921. https://doi.org/10.3390/s23135921

    Article  Google Scholar 

  13. Chiquito A, Bodin U, Schelen O (2023) Attribute-based approaches for secure data sharing in industrial contexts. IEEE Access 11:10180–10195. https://doi.org/10.1109/ACCESS.2023.3240000

  14. Arshad H, Johansen C, Owe O, Picazo-Sanchez P, Schneider G (2022) Semantic attribute-based encryption: a framework for combining ABE schemes with semantic technologies. Inf Sci 616:558–576. https://doi.org/10.1016/j.ins.2022.10.132

    Article  Google Scholar 

  15. Lee E, Young DS, Se RO, Young GK (2021) A survey on standards for interoperability and security in the internet of things. IEEE Commun Surv Tut 23(2):1020–1047. https://doi.org/10.1109/COMST.2021.3067354

  16. Koo J, Young GK (2021) Interoperability requirements for a smart city. In: Proceedings of the ACM symposium on applied computing, pp 690–698. https://doi.org/10.1145/3412841.3441948

  17. Bruhadeshwar B, Ray I (2018) Attribute-based encryption: applications and future directions. lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Vol. 11170 LNCS. Springer International Publishing. https://doi.org/10.1007/978-3-030-04834-1_18

  18. Alfredo R, Danezis G (2011) Privacy-preserving smart metering. In: Proceedings of the ACM conference on computer and communications security, pp 49–60. https://doi.org/10.1145/2046556.2046564

  19. Jammula M, Vakamulla VM, Kondoju SK (2022) Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system. Connect Sci. https://doi.org/10.1080/09540091.2022.2124957

    Article  Google Scholar 

  20. Phuong X, Viet T, Ning R, Xin X, Wu H (2018) Puncturable attribute-based encryption for secure data delivery in the internet of things. In: Proceedings—IEEE INFOCOM 2018, pp 1511–1519. https://doi.org/10.1109/INFOCOM.2018.8485909

  21. Ge C, Susilo W, Baek J, Liu Z, Xia J, Fang L (2022) Revocable attribute-based encryption with data integrity in clouds. IEEE Trans Depend Sec Comput 19(5):2864–2872. https://doi.org/10.1109/TDSC.2021.3065999

    Article  Google Scholar 

  22. Liu Y, Shengwei X, Ziyan Y (2023) A lightweight CP-ABE scheme with direct attribute revocation for vehicular ad hoc network. Entropy 25(7):979. https://doi.org/10.3390/e25070979

  23. Kennedy E, Jang B, Wook Kim J (2021) CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute. PLoS ONE 16. https://doi.org/10.1371/journal.pone.0250992

  24. Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171–2180. https://doi.org/10.1109/TPDS.2012.61

    Article  Google Scholar 

  25. Shen X, Chuanhe H, Danxin W, Jiaoli S (2021) A privacy-preserving attribute-based encryption system for data sharing in smart cities. Wireless Commun Mob Comput.https://doi.org/10.1155/2021/6686675

  26. Rasori M, La Manna M, Perazzo P, Dini G (2022) A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 9(11):8269–8290. https://doi.org/10.1109/JIOT.2022.3154039

    Article  Google Scholar 

  27. Tamizharasi GS, Balamurugan B, Aarthy SL (2016) Scalable and efficient attribute based encryption scheme for point to multipoint communication in cloud computing. In: Proceedings of the international conference on inventive computation technologies, ICICT 2016, pp 1. https://doi.org/10.1109/INVENTIVE.2016.7823292

  28. Taha MB, Talhi C, Ould-Slimane H (2019) Performance evaluation of cp-abe schemes under constrained devices. Procedia Comput Sci 155:425–432. https://doi.org/10.1016/j.procs.2019.08.059

    Article  Google Scholar 

  29. Ambrosin M, Anzanpour A, Conti M, Dargahi T, Moosavi SR, Rahmani AM, Liljeberg P (2016) On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 36(6):25–35. https://doi.org/10.1109/MM.2016.101

    Article  Google Scholar 

  30. Wang X, Jianqing Z, Eve M, Schooler MI (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE international conference on communications, ICC 2014, pp 725–730. https://doi.org/10.1109/ICC.2014.6883405

  31. Guo F, Yi M, Willy S, Duncan SW, Vijay V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Transact Inform Foren Secur 9(5):763–771. https://doi.org/10.1109/TIFS.2014.2309858

  32. Asim M, Milan P, Tanya I (2014) Attribute-based encryption with encryption and decryption outsourcing. In: Proceedings of 12th Australian information security management conference, AISM 2014, pp 21–28. https://doi.org/10.4225/75/57b65cc3343d0

  33. Zhang J, Xin Y, Gao Y, Lei X, Yang Y (2021) Secure ABE scheme for access management in blockchain-based IoT. IEEE Access 9:54840–54849. https://doi.org/10.1109/ACCESS.2021.3071031

    Article  Google Scholar 

  34. Fun TS, Samsudin A (2017) Attribute based encryption—a data centric approach for securing internet of things (IoT). Adv Sci Lett 23(5):4219–4223. https://doi.org/10.1166/asl.2017.8315

    Article  Google Scholar 

  35. Sadeeq Mohammed AM, Subhi RM, Zeebaree RQ, Sarkar HA, Karwan J (2018) Internet of things security: a survey. In: ICOASE 2018—international conference on advanced science and engineering, pp 162–66. https://doi.org/10.1109/ICOASE.2018.8548785

  36. Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145. https://doi.org/10.1109/JIOT.2018.2825289

    Article  Google Scholar 

  37. Imam R, Kumar K, Raza SM, Sadaf R, Anwer F, Fatima N, Nadeem M, Abbas M, Rahman O (2022) A systematic literature review of attribute based encryption in health services. J King Saud Univ Comput Inform Sci 34(9):6743–6774. https://doi.org/10.1016/j.jksuci.2022.06.018

    Article  Google Scholar 

  38. Yang W, Zhitao G (2019) An efficient attribute based encryption scheme in smart grid. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in Bioinformatics) 11982 LNCS: 159–72. https://doi.org/10.1007/978-3-030-37337-5_13

  39. Li T, Jiawei Z, Yanbo Y, Wei Q, Yangxu L (2021) Auditable and times limitable secure data access control for cloud-based industrial internet of things. J Netw Netw Appl 1(3):129–138. https://doi.org/10.33969/j-nana.2021.010306

  40. Karankar N, Seth A (2023) A comprehensive survey on internet of things security: challenges and solutions. Lect Notes Data Eng Commun Technol 166:711–728. https://doi.org/10.1007/978-981-99-0835-6_51

    Article  Google Scholar 

  41. Sajid A, Shah SW, Magsi T (2022) Comprehensive survey on smart cities architectures and protocols. EAI Endors Transact Smart Cities 6(18):e5. https://doi.org/10.4108/eetsc.v6i18.2065

    Article  Google Scholar 

  42. Fawaz K, Shin KG (2019) Security and privacy in the internet of things. Computer 52(4):40–49. https://doi.org/10.1109/MC.2018.2888765

    Article  Google Scholar 

  43. Cui H, Deng RH, Wang G (2019) An Attribute-based framework for secure communications in vehicular ad hoc networks. IEEE/ACM Trans Netw 27(2):721–733. https://doi.org/10.1109/TNET.2019.2894625

    Article  Google Scholar 

  44. Utomo IS, Celine MP, Daniel JVM, Bakti AJ (2022) A systematic literature review of privacy, security, and challenges on applying IoT to create smart home. In: Proceedings—IEIT 2022: 2022 international conference on electrical and information technology, pp 154–159. https://doi.org/10.1109/IEIT56384.2022.9967907

  45. Chowdhury R, Hakima OS, Chamseddine T, Mohamed C (2017) Attribute-based encryption for preserving smart home data privacy. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10461 LNCS, pp 185–97. https://doi.org/10.1007/978-3-319-66188-9_16

  46. Chukkapalli S, Laya SS, Piplai A, Mittal S, Gupta M, Joshi A (2020) A smart-farming ontology for attribute based access control. In: Proceedings—2020 IEEE 6th intl conference on big data security on cloud, BigDataSecurity 2020, 2020 IEEE intl conference on high performance and smart computing, HPSC 2020 and 2020 IEEE Intl conference on intelligent data and security, IDS 2020, pp 29–34. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00017

  47. Ferrag MA, Shu L, Yang X, Derhab A, Maglaras L (2020) Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8:32031–32053. https://doi.org/10.1109/ACCESS.2020.2973178

    Article  Google Scholar 

  48. Huan L, Xueyan L, Ruirui S, Linpeng L (2023) Privacy-preserving attribute-based educational service recommendation in online education system. In: Proceedings of the 2022 international conference on computer science, information engineering and digital economy (CSIEDE 2022) 103, pp 826–38. https://doi.org/10.2991/978-94-6463-108-1_92

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kirti Dinkar More .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

More, K.D., Pramod, D. (2024). Attribute-Based Encryption for the Internet of Things: A Review. In: Sharma, H., Shrivastava, V., Tripathi, A.K., Wang, L. (eds) Communication and Intelligent Systems. ICCIS 2023. Lecture Notes in Networks and Systems, vol 968. Springer, Singapore. https://doi.org/10.1007/978-981-97-2079-8_26

Download citation

Publish with us

Policies and ethics