Preprint Article Version 1 This version is not peer-reviewed

Application of Attribute-Based Encryption in Military Internet of Things Environment

Version 1 : Received: 26 July 2024 / Approved: 29 July 2024 / Online: 30 July 2024 (07:39:03 CEST)

How to cite: Pióro, Ł.; Sychowiec, J.; Kanciak, K.; Zieliński, Z. Application of Attribute-Based Encryption in Military Internet of Things Environment. Preprints 2024, 2024072360. https://doi.org/10.20944/preprints202407.2360.v1 Pióro, Ł.; Sychowiec, J.; Kanciak, K.; Zieliński, Z. Application of Attribute-Based Encryption in Military Internet of Things Environment. Preprints 2024, 2024072360. https://doi.org/10.20944/preprints202407.2360.v1

Abstract

Military Internet of Things (MIoT) has emerged as a new research area in military intelligence. The MIoT frequently has to constitute a federation-capable IoT environment when the military needs to interact with other institutions and organizations or carry out joint missions as part of a coalition such as in NATO. One of the main challenges of deploying MIoT in such an environment is to acquire, analyze, and merge huge amounts of data from many different IoT devices and disseminate it in a secure, reliable, and context-dependent manner. In this work, we present a comprehensive solution for secure data dissemination based on the integration of Hyperledger Fabric's distributed registry technology, Apache Kafka message broker, and data processing microservices implemented using the Kafka Streams API library and applying attribute-based encryption (ABE), a cryptographic approach that facilitates controlling access to information based on data and user attributes rather than traditional methods that rely on specific keys. In the work, we built an experimental setup, implemented an access control scheme designed for mobile components, and performed an evaluation of its performance. Performance tests have confirmed the suitability of the developed cryptographic method for attribute-based data access control in MIoT systems, considering the federations of military networks. The results indicate that the proposed cryptographic scheme is viable for the number of attributes typically assumed to be used in battlefield networks, offering a good trade-off between security and performance for modern cryptographic applications.

Keywords

Internet of Things; Blockchain; Attribute-Based Encryption

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.