Secure data provenance in Internet of Things based networks by outsourcing attribute based signatures and using Bloom filters

9Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the security of IoT data moving through the network becomes prone to attacks. IoT networks require a secure provenance mechanism, which is efficient and lightweight because of the scarce computing and storage resources at the IoT nodes. In this paper, we have proposed a secure mechanism to sign and authenticate provenance messages using Ciphertext-Policy Attribute Based Encryption (CP-ABE) based signatures. The proposed technique uses Bloom filters to reduce storage requirements and an outsourced ABE mechanism to use lessen the computational requirements at the IoT devices. The proposed technique helps in reducing the storage requirements and computation time in IoT devices. The performance of the proposed mechanism is evaluated and the results show that the proposed solution is best suited for resourced constrained IoT network.

Cite

CITATION STYLE

APA

Siddiqui, M. S., Rahman, A., Nadeem, A., & Alzahrani, A. M. (2019). Secure data provenance in Internet of Things based networks by outsourcing attribute based signatures and using Bloom filters. International Journal of Advanced Computer Science and Applications, 10(5), 221–226. https://doi.org/10.14569/ijacsa.2019.0100529

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free