Fine-grained encryption for search and rescue operation on Internet of Things

Depeng Li, Srinivas Sampalli, Zeyar Aung, John Williams, Abel Sanchez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The search and rescue operation is an increasingly important Internet of Things (IoT) application in which the resource-constrained things play the rescue role. Recently, more and more countries/organizations participate in a rescue task. To make the task more effective, they should share their information with each other but different countries have assorted sharing policies. Our investigation shows that access control systems for current search and rescue operations are either coarse-grained or computationally heavy. It cannot satisfy the rescue operations since those things demand lightweight cryptographic operations and the participating countries require flexible policies to protect their classified data. We propose a fine-grained access control system which is not only secure but also efficient. The practical experiments are conducted and its results demonstrate the lightweight cost in simulation.

Original languageBritish English
Title of host publicationAsia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479919550
DOIs
StatePublished - 2014
Event2014 Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2014 - Nadi, Fiji
Duration: 4 Nov 20145 Nov 2014

Publication series

NameAsia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2014

Conference

Conference2014 Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2014
Country/TerritoryFiji
CityNadi
Period4/11/145/11/14

Keywords

  • Attributed-based encryption
  • Fine-grained
  • Internet of Things
  • Privacy preservation
  • Search and rescue

Fingerprint

Dive into the research topics of 'Fine-grained encryption for search and rescue operation on Internet of Things'. Together they form a unique fingerprint.

Cite this