Aceleração de Assinaturas Baseadas em Atributos para Internet das Coisas
Resumo
Antes de integrar dispositivos com restrições de recursos computacionais em domínios de IoT, deve-se garantir que possuam ferramental criptográfico suficiente para estabelecer mecanismos de segurança essenciais. Neste contexto, as Assinaturas baseadas em Atributos (ABS) mostramse uma opção elegante na implementação de um esquema de autenticação e autorização. Neste trabalho discutimos diferentes abordagens para a aceleração de (ABS) considerando-se como plataforma alvo os dispositivos com restrições de recursos computacionais em domínios de IoT.Referências
Abdul-Ghani, H. A., Konstantas, D., and Mahyoub, M. (2018). A comprehensive IoT attacks survey based on a building-blocked reference model. IJACSA’18.
Amdahl, G. M. (1967). Validity of the single processor approach to achieving large scale computing capabilities. In SJCC’67.
Aranha, D. F., Oliveira, L. B., Lopez, J., and Dahab, R. (2009). NanoPBC: implementing cryptographic pairings on an 8-bit platform. In CHiLE’09.
Barreto, P. S. L. M. and Naehrig, M. (2005). Pairing-friendly Elliptic Curves of Prime Order. In SAC’05.
Gouvêa, C. P., Oliveira, L. B., and López, J. (2012). Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. JCEN’12.
Gouvêa, C. P. L. and López, J. (2009). Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In Indocrypt’09.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In CCS’06.
Graham, S. L., Kessler, P. B., and Mckusick, M. K. (1982). Gprof: A call graph execution profiler. In SIGPLAN’82.
Joux, A. (2013). A new index calculus algorithm with complexity l(1=4 + o(1)) in small characteristic. In SAC’13.
Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., Gentille, N., Loureiro, A. A. F., Aranha, D. F., Patil, H. K., and Oliveira, L. B. (2016). AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In Sensys’16.
Oliveira, L. B., Aranha, D., Morais, E., Daguano, F., López, J., and Dahab, R. (2007).
TinyTate: Computing the tate pairing in resource-constrained nodes. In NCA’07.
Oliveira, L. B. and Dahab, R. (2006). Pairing-based cryptography for sensor networks. In NCA’06.
Oliveira, L. B., Scott, M., Lopez, J., and Dahab, R. (2008). TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. In INSS’08.
Sakai, R., Ohgishi, K., and Kasahara, M. (2000). Cryptosystems Based on Pairing. In SCIS’00.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Unterluggauer, T. and Wenger, E. (2014). Efficient pairings and ECC for embedded systems. In CHES’14.
Weiser, M. (1991). The computer for the 21 st century. Scientific American.
Amdahl, G. M. (1967). Validity of the single processor approach to achieving large scale computing capabilities. In SJCC’67.
Aranha, D. F., Oliveira, L. B., Lopez, J., and Dahab, R. (2009). NanoPBC: implementing cryptographic pairings on an 8-bit platform. In CHiLE’09.
Barreto, P. S. L. M. and Naehrig, M. (2005). Pairing-friendly Elliptic Curves of Prime Order. In SAC’05.
Gouvêa, C. P., Oliveira, L. B., and López, J. (2012). Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. JCEN’12.
Gouvêa, C. P. L. and López, J. (2009). Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In Indocrypt’09.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006). Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In CCS’06.
Graham, S. L., Kessler, P. B., and Mckusick, M. K. (1982). Gprof: A call graph execution profiler. In SIGPLAN’82.
Joux, A. (2013). A new index calculus algorithm with complexity l(1=4 + o(1)) in small characteristic. In SAC’13.
Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., Gentille, N., Loureiro, A. A. F., Aranha, D. F., Patil, H. K., and Oliveira, L. B. (2016). AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In Sensys’16.
Oliveira, L. B., Aranha, D., Morais, E., Daguano, F., López, J., and Dahab, R. (2007).
TinyTate: Computing the tate pairing in resource-constrained nodes. In NCA’07.
Oliveira, L. B. and Dahab, R. (2006). Pairing-based cryptography for sensor networks. In NCA’06.
Oliveira, L. B., Scott, M., Lopez, J., and Dahab, R. (2008). TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. In INSS’08.
Sakai, R., Ohgishi, K., and Kasahara, M. (2000). Cryptosystems Based on Pairing. In SCIS’00.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Unterluggauer, T. and Wenger, E. (2014). Efficient pairings and ECC for embedded systems. In CHES’14.
Weiser, M. (1991). The computer for the 21 st century. Scientific American.
Publicado
02/09/2019
Como Citar
MAIA NETO, Antonio; RICHARDSON, Stephen; HOROWITZ, Mark; OLIVEIRA, Leonardo.
Aceleração de Assinaturas Baseadas em Atributos para Internet das Coisas. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 427-432.
DOI: https://doi.org/10.5753/sbseg.2019.13993.