End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies

This page contains complementary material related to the following paper:
  • Title: End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
  • Authors: Stefano Berlato, Roberto Carbone, Umberto Morelli and Silvio Ranise

Abstract

It is crucial to ensure the security and privacy of communications in IoT scenarios that process an increasingly large amount of sensitive data. In this context, we propose a cryptographic enforcement mechanism of access control policies to guarantee the confidentiality and integrity of messages exchanged with the MQTT protocol in presence of external attackers, malicious insiders and "honest-but-curious" service providers. A preliminary performance evaluation with a prototype implementation in an open-source tool shows the overhead is acceptable in relevant use case scenarios and provides a higher level of security with respect to other approaches.

Complementary Material

Below, you find links to complementary material and additional resources referenced in the paper.

Extended Article

An extended version of this work with more details on the Cryptographic Access Control scheme is available here

Experimental Results

The experimental results of the configurations described in the paper are available here

Involved People

Berlato Stefano

Stefano Berlato

Carbone Roberto

Roberto Carbone

Morelli Umberto

Umberto Morelli

Ranise Silvio

Silvio Ranise