Smart City Gnosys

Smart city article details

Title A Survey On Attribute-Based Encryption Schemes Suitable For The Internet Of Things
ID_Doc 5221
Authors Rasori M.; Manna M.L.; Perazzo P.; Dini G.
Year 2022
Published IEEE Internet of Things Journal, 9, 11
DOI http://dx.doi.org/10.1109/JIOT.2022.3154039
Abstract The Internet of Things (IoT) is an information service paradigm based on the integration of smart objects, mobile devices, and computers via the Internet. IoT technologies are key enablers for a multitude of applications in diverse fields, such as digital health, smart city, industrial automation, and supply chain. This raises new security and privacy challenges that can be addressed by advanced cryptographic methods. One of the most prominent is attribute-based encryption (ABE), which allows one to encrypt data while enforcing fine-grained access control on it. ABE is advantageous in many IoT applications since it allows data to be safely stored on untrusted storage, such as third-party cloud servers, hackable publish-subscribe brokers, physically accessible sensors, etc. This article surveys the ABE literature proposing schemes and solutions that are best suited for IoT applications. To do so, it first identifies three performance indicators that are key in IoT, namely, the data producer CPU efficiency, the data producer bandwidth efficiency, and the key authority bandwidth efficiency. Then, it analyzes only those schemes that are promising from the point of view of one or more indicators and, therefore, more applicable in typical IoT applications. As a further contribution, this article selects a subset of representative schemes and assesses their efficiency by thorough simulations. Such simulations show that no scheme excels in all three performance indicators at once, but some simultaneously perform well in two indicators. © 2014 IEEE.
Author Keywords Access control; Attribute-based encryption (ABE); Data-centric security; Internet of Things (IoT)


Similar Articles


Id Similarity Authors Title Published
11067 View0.965Shruti; Rani S.; Sah D.K.; Gianini G.Attribute-Based Encryption Schemes For Next Generation Wireless Iot Networks: A Comprehensive SurveySensors, 23, 13 (2023)
46809 View0.912Riad K.Robust Access Control For Secure Iot Outsourcing With Leakage ResilienceSensors, 25, 3 (2025)
1273 View0.905Wu C.-Y.; Huang K.-H.; Hsu C.-Y.A Decentralised Multi-Authority Attribute-Based Encryption For Secure And Scalable Iot Access ControlApplied Sciences (Switzerland), 15, 7 (2025)
25609 View0.893Aga D.T.; Chintanippu R.; Mowri R.A.; Siddula M.Exploring Secure And Private Data Aggregation Techniques For The Internet Of Things: A Comprehensive ReviewDiscover Internet of Things, 4, 1 (2024)
47574 View0.885Chinnasamy P.; Praveena V.Secure And Efficient Data Sharing Scheme In Cloud For Protecting Data In Smart CitiesEAI/Springer Innovations in Communication and Computing (2021)
47934 View0.878Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47643 View0.866Shruti; Rani S.; Srivastava G.Secure Hierarchical Fog Computing-Based Architecture For Industry 5.0 Using An Attribute-Based Encryption SchemeExpert Systems with Applications, 235 (2024)
23895 View0.866Routray K.; Das A.; Bera P.Enhancing Privacy And Trust In Societal Surveillance Through Attribute-Based EncryptionInternational Conference on Communication Systems and Networks, COMSNETS, 2025 (2025)
23929 View0.864Desai L.R.; Malathi P.; Patil D.M.; Sonone S.T.; Kalokhe S.G.; Jawalkar A.Enhancing Security In Iot Devices With A Comprehensive Analysis Of Lightweight Cryptographic AlgorithmsAdvances in Nonlinear Variational Inequalities, 27, 4 (2024)
47865 View0.863Awad A.I.; Abawajy J.Security And Privacy In The Internet Of Things: Architectures, Techniques, And ApplicationsSecurity and Privacy in the Internet of Things: Architectures, Techniques, and Applications (2021)