DOI QR코드

DOI QR Code

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong (Department of Computer Engineering, Pusan National University) ;
  • Kim, Howon (Department of Computer Engineering, Pusan National University)
  • Received : 2012.05.11
  • Accepted : 2012.06.29
  • Published : 2012.12.31

Abstract

ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Keywords

Acknowledgement

Supported by : National Research Foundation of Korea (NRF)

References

  1. X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute based proxy reencryption with delegating capabilities," in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp. 276-286, 2009.
  2. H. Seo and H. Kim, "Attribute-based proxy re-encryption with a constant number of pairing operations," Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, pp. 53-60, 2012. https://doi.org/10.6109/jicce.2012.10.1.053
  3. S. T. Nguyen and C. Rong, "ZigBee security using identity-based cryptography," Autonomic and Trusted Computing, Lecture Notes in Computer Science, vol. 4610, pp. 3-12, 2007.
  4. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, 2001.
  5. H. Seo, C. S. Kim, and H. Kim, "ZigBee security for Home automation using attribute-based cryptography," in Proceedings of the IEEE International Conference on Consumer Electronics, Las Vegas: NV, pp. 364-368, 2011.
  6. H. Seo and H. Kim, "Zigbee security for visitors in home automation using attribute based proxy re-encryption," in Proceedings of the 15th IEEE International Symposium on Consumer Electronics, Singapore, pp. 304-307, 2011.
  7. L. B. Oliveira, D. F. Aranha, C. P. L. Gouvea, M. Scott, D. F. Camara, J. Lopez, and R. Dahab, "TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks," Computer Communications, vol. 34, no. 3, pp. 485-493, 2011. https://doi.org/10.1016/j.comcom.2010.05.013