Fine-grained encryption for search and rescue operation on Internet of Things

The search and rescue operation is an increasingly important Internet of Things (IoT) application in which the resource-constrained things play the rescue role. Recently, more and more countries/organizations participate in a rescue task. To make the task more effective, they should share their information with each other but different countries have assorted sharing policies. Our investigation shows that access control systems for current search and rescue operations are either coarse-grained or computationally heavy. It cannot satisfy the rescue operations since those things demand lightweight cryptographic operations and the participating countries require flexible policies to protect their classified data. We propose a fine-grained access control system which is not only secure but also efficient. The practical experiments are conducted and its results demonstrate the lightweight cost in simulation.

[1]  Radha Poovendran,et al.  Aviation Cyber–Physical Systems: Foundations for Future Aircraft and Air Transport , 2013, Proceedings of the IEEE.

[2]  Depeng Li,et al.  An Efficient Contributory Group Rekeying Scheme based on Hash Functions for MANETs , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[3]  W. Marsden I and J , 2012 .

[4]  Yves Roudier,et al.  SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations , 2005, ESAS.

[5]  Klara Nahrstedt,et al.  SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks , 2009, IEEE Transactions on Information Forensics and Security.

[6]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[7]  M. L. Olive Efficient datalink security in a bandwidth-limited mobile environment - an overview of the Aeronautical Telecommunications Network (ATN) security concept , 2001, 20th DASC. 20th Digital Avionics Systems Conference (Cat. No.01CH37219).

[8]  John R. Williams,et al.  Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[9]  Martina Zitterbart,et al.  A Survey of Protocols to Support IP Mobility in Aeronautical Communications , 2011, IEEE Communications Surveys & Tutorials.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[12]  B. Stephens,et al.  Security architecture for aeronautical networks , 2004, The 23rd Digital Avionics Systems Conference (IEEE Cat. No.04CH37576).

[13]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[14]  Neeli R. Prasad,et al.  Secure & trusted communication in emergency situations , 2012, 2012 35th IEEE Sarnoff Symposium.

[15]  John R. Williams,et al.  P3: Privacy preservation protocol for appliance control application , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[16]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.