• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Secure Multicast using Proxy Re-Encryption in an IoT Environment

Vol. 12, No.2, February 28, 2018
10.3837/tiis.2018.02.025, Download Paper (Free):

Abstract

Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
SuHyun Kim, YongWoon Hwang and JungTaek Seo, "Secure Multicast using Proxy Re-Encryption in an IoT Environment," KSII Transactions on Internet and Information Systems, vol. 12, no. 2, pp. 946-959, 2018. DOI: 10.3837/tiis.2018.02.025

[ACM Style]
Kim, S., Hwang, Y., and Seo, J. 2018. Secure Multicast using Proxy Re-Encryption in an IoT Environment. KSII Transactions on Internet and Information Systems, 12, 2, (2018), 946-959. DOI: 10.3837/tiis.2018.02.025