Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications
Abstract
:1. Introduction
2. Materials and Methods
2.1. Architecture
2.2. Homomorphic Encryption
2.2.1. ElGamal-Type Cryptosystems
2.2.2. An Application of Paillier Cryptosystem
- ;
- , where the function is defined as the integer quotient .
- (a)
- .
- (b)
- (b)
- In the same way, we use the homomorphic properties of the cryptosystem:. The result now follows by applying the decryption function and taking into account that .
3. Results
- Communication;
- Processing;
- Power consumption;
- Sensorization.
- Microcontrollers (UC Berkeyely Mica and similar "motes"), which are embedded platforms whose processing core is typically constituted by an atmega microcontroller, low-power radio modules and the ability to connect boards with sensors. The system they usually run is very restrictive and restricted, and in most cases, it is not useful to use cryptographic libraries (in this case, they should be implemented from scratch, and this incurs the risk of increasing vulnerabilities and running inefficient code).
- ARM, as in the case of iMote (Intel), or particular developments on ARM where there is a powerful, low-power-consumption, and well-proven architecture and where, in addition, the communication modules (antennas) are incorporated in the area dedicated to the processor [19].
3.1. Trends
3.1.1. Security
3.1.2. Sensing
3.1.3. Communication
- 802.15.4 (Zigbee,® 6LoWPan);
- Bluetooth;
- Wi-Fi.
3.2. Testbed
- Testbed1: Four 64-bit ARM operating at a clock rate of 1.5 Ghz, 4 GB RAM (Cortex A72);
- Testbed2: Four 64-bit ARM operating at a clock rate of 1.5 Ghz, 128 MB RAM (Cortex A72);
- Testbed3: Four 64-bit ARM operating at a clock rate of 1.2 Ghz, 1 GB RAM (Cortex A53).
4. Discussion
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Mähler, V.; Westergren, U.H. Working with IoT? A case study detailing workplace digitalization through IoT system adoption. In Internet of Things. Information Processing in an Increasingly Connected World; Strous, L., Cerf, V., Eds.; Springer: Cham, Switzerland, 2019; pp. 178–193. [Google Scholar]
- Tran-Dang, H.; Krommenacker, N.; Charpentier, P.; Kim, D.S. Toward the Internet of Things for Physical Internet: Perspectives and Challenges. IEEE Internet Things J. 2020, 7, 4711–4736. [Google Scholar] [CrossRef]
- Radoglou Grammatikis, P.I.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
- Boeckl, K.; Fagan, M.; Fisher, W.; Lefkovitz, N.; Megas, K.; Nadeau, E.; O’Rourke, D.G.; Piccarreta, B.; Scarfone, K. Consideration for Managing Internet of Things (IoT) Cybersecurity and Privacy Risk; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Elijah, O.; Rahman, T.A.; Orikumhi, I.; Leow, C.Y.; Hindia, M.N. An overview of internet of things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE Internet Things J. 2018, 5, 3758–3773. [Google Scholar] [CrossRef]
- Haro-Olmo, F.J.; Alvarez-Bermejo, J.A.; Varela-Vaca, A.J.; Lopez-Ramos, J.A. Blockchain based federation of wireless sensor nodes. J. Supercomput. 2021, 77, 7879–7891. [Google Scholar] [CrossRef]
- Sadawi, A.A.; Hassan, M.S.; Ndiaye, M. A Survey on the Integration of Blockchain With IoT to Enhance Performance and Eliminate Challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on Blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Loukil, F.; Ghedira-Guegan, C.; Boukadi, K.; Benharkat, A.-N. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption. Sensors 2021, 21, 2452. [Google Scholar] [CrossRef] [PubMed]
- Li, J.; Qiao, Z.; Zhang, K.; Cui, C. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors 2021, 21, 288. [Google Scholar] [CrossRef] [PubMed]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology-Eurocrypt’99; Eurocrypt 1999; Lecture Notes in Computer Science; Stern, J., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
- Sherman, A.T.; McGrew, D.A. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 2003, 29, 444–458. [Google Scholar] [CrossRef] [Green Version]
- Duan, Y.; Canny, J. How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. In Topics in Cryptology CT-RSA 2006; CT-RSA; Lecture Notes in Computer Science; Pointcheval, D., Ed.; Springer: Berlin/Heidelberg, Germany, 2006; Volume 3860, pp. 244–261. [Google Scholar]
- Veeraraghavan, P.; Hanna, D.; Pardede, E. Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network. Electronics 2019, 8, 1162. [Google Scholar] [CrossRef]
- Rivest, R.L.; Adleman, L.; Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation; Academia Press: Cambridge, MA, USA, 1978; pp. 169–178. [Google Scholar]
- Koblitz, N. Elliptic Curve Cryptosystems. Math. Comp. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Miller, V.S. Use of elliptic curves in cryptography. In Advances in Cryptology—CRYPTO ’85 Proceedings; CRYPTO 1985 Lecture Notes in Computer Science 218; Williams, H.C., Ed.; Springer: Berlin/Heidelberg, Germany, 1986; pp. 417–426. [Google Scholar]
- Portilla, J.; De Castro, A.; de la Torre, E.; Riesgo, T. A Modular Architecture for Nodes in Wireless Sensor Networks. JUCS-J. Univer. Comput. Sci. 2006, 12, 328–339. [Google Scholar]
- Nachman, L.; Kling, R.; Adler, R.; Huang, J.; Hummel, V. The Intel Mote Platform: A Bluetooth-based Sensor Network for Industrial Monitoring. In Proceedings of the IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, USA, 24–27 April 2005; pp. 437–442. [Google Scholar]
- Matsumoto, M.; Oguchi, M. Speeding Up Encryption on IoT Devices Using Homomorphic Encryption. In Proceedings of the 2021 IEEE International Conference on Smart Computing (SMARTCOMP), Irvine, CA, USA, 23–27 August 2021; pp. 270–275. [Google Scholar]
- Makwana, S. An application of homomorphic encryption on IoT based green house. In Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 2723–2726. [Google Scholar]
- Matsumoto, M.; Oguchi, M. Speeding Up Sensor Data Encryption with a Common Key Cryptosystem combined with Fully Homomorphic Encryption on Smartphones. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 500–505. [Google Scholar]
- Yoon, I.; Cao, N.; Amaravati, A.; Raychowdhury, A. A 55nm 50nJ/encode 13nJ/decode Homomorphic Encryption Crypto-Engine for IoT Nodes to Enable Secure Computation on Encrypted Data. In Proceedings of the 2019 IEEE Custom Integrated Circuits Conference (CICC), Austin, TX, USA, 14–17 April 2019; pp. 1–4. [Google Scholar]
- Zhang, L.; Xu, J.; Vijayakumar, P.; Sharma, P.K.; Ghosh, U. Homomorphic Encryption-based Privacy-preserving Federated Learning in IoT-enabled Healthcare System. In IEEE Transactions on Network Science and Engineering; 2022; Available online: https://ieeexplore.ieee.org/document/9812492 (accessed on 16 September 2022).
Testbed 1 | Testbed 2 | Testbed 3 | |
---|---|---|---|
Encryption | 101.45 | 115.81 | 556.02 |
Decryption | 113.62 | 127.79 | 601.35 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
López Delgado, J.L.; Álvarez Bermejo, J.A.; López Ramos, J.A. Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications. Sensors 2022, 22, 8022. https://doi.org/10.3390/s22208022
López Delgado JL, Álvarez Bermejo JA, López Ramos JA. Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications. Sensors. 2022; 22(20):8022. https://doi.org/10.3390/s22208022
Chicago/Turabian StyleLópez Delgado, Juan Luis, José Antonio Álvarez Bermejo, and Juan Antonio López Ramos. 2022. "Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications" Sensors 22, no. 20: 8022. https://doi.org/10.3390/s22208022
APA StyleLópez Delgado, J. L., Álvarez Bermejo, J. A., & López Ramos, J. A. (2022). Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications. Sensors, 22(20), 8022. https://doi.org/10.3390/s22208022