Seneors报告 同态非对称加密在物联网通信分析中的应用-2022年

ID:28646

大小:0.61 MB

页数:11页

时间:2023-01-07

金币:10

上传者:战必胜
Citation: López Delgado, J.L.;
Álvarez Bermejo, J.A.; López
Ramos, J.A. Homomorphic
Asymmetric Encryption Applied to
the Analysis IoT Communications.
Sensors 2022, 22, 8022. https://
doi.org/10.3390/s22208022
Academic Editors: Daniele Giusto
and Matteo Anedda
Received: 17 September 2022
Accepted: 17 October 2022
Published: 20 October 2022
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
sensors
Article
Homomorphic Asymmetric Encryption Applied to the Analysis
of IoT Communications
Juan Luis López Delgado
1,†
, José Antonio Álvarez Bermejo
1,†
and Juan Antonio López Ramos
2,
*
,†
1
Department of Informatics, University of Almeria, 04120 Almeria, Spain
2
Department of Mathematics, University of Almeria, 04120 Almeria, Spain
* Correspondence: jlopez@ual.es
These authors contributed equally to this work.
Abstract:
In this paper, we describe the use of homomorphic encryption techniques in order to not
only ensure the data are transmitted in a confidential way, but also to use the encrypted data to
provide the manager with statistics that allow them to detect the incorrect functioning of a sensor
node or a group of sensors due to either malicious data injection, data transmission, or simply sensor
damage (miscalibration, faulty sensor functioning). Obtaining these statistical values does not need
decryption, so the process is sped up and can be developed in real time. Operating the data in this
way ensures privacy and removes the need to maintain a shared key infrastructure between the
sensor nodes and the manager nodes that are part of the blockchain infrastructure. In this work, we
focus on operations with the sensor nodes that provide data that will be, later, treated as part of the
business logic in the agribusiness sector (for example), hence the importance of having fast checking
mechanisms in terms of data quality. The results obtained on conventional configurations of sensor
nodes encourage the use of this technique in the aforementioned infrastructure.
Keywords: asymmetric encryption; homomorphic encryption; IoT
1. Introduction
Wireless sensor networks constitute an integral part of most Internet of Things (IoT)
devices, and their presence nowadays in our lives is growing exponentially [
1
]. The
application areas of this emerging technology go from the development of autonomous cars
to e-health, defense, or smart cities [
2
]. The transmitted data through the wireless sensor
network is transformed into information, which is used to make decisions. Therefore,
in most cases, a key point is to ensure the security of communications, and this leads to
focusing on security requirements [
3
], which include confidentiality, integrity of the data
transmitted, authentication of the source, and non-repudiation. Achieving these objectives
is of crucial importance [
4
], especially in an environment where no human interaction is
present, as is proposed in the definition of the IoT [
5
] as an interrelated system of devices
with the ability to transfer data over networks. In this way, providing security for IoT
communications presents different challenges The first one is to to find a way to maintain
security with a technology requiring very limited computing resources, data storage, and
even power consumption. The use of lightweight cryptographic algorithms helps to achieve
the security requirements as well as energy savings. A second point to consider is data
processing. It could be that our IoT application interconnects a large number of IoT devices
which generate a huge quantity of data that aim to make decisions in real time; thus, it is
necessary that the architecture uses scales with a wide range of sensors and, at the same
time, provides interoperability since the network could be heterogeneous, where some
devices simply transmit data, whereas there exist others that could perform computations
that help in decision making.
In [
6
], the authors introduce a solution based on blockchain technology that takes into
account all the preceding requirements. The use of blockchain in IoT networks is not new
Sensors 2022, 22, 8022. https://doi.org/10.3390/s22208022 https://www.mdpi.com/journal/sensors
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭