YoVDO

JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Access Control Courses IoT security Courses

Course Description

Overview

Explore a comprehensive presentation on JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol designed for Internet of Things (IoT) systems. Delve into the challenges of securing communication in large-scale IoT environments like smart buildings and cities, where multiple principals interact indirectly via intermediaries. Learn how JEDI addresses these challenges by encrypting and signing messages end-to-end while conforming to the decoupled communication model typical of IoT systems. Discover the protocol's key features, including support for expiry, fine-grained data access, and the ability for principals to delegate restricted keys to other principals. Examine the careful protocol design and implementation that enables JEDI to run across a spectrum of IoT devices, including ultra low-power deeply embedded sensors with severe CPU, memory, and energy constraints. Follow the presenter's journey from the preliminary design using Attribute-Based Encryption (ABE) to the final implementation using a more efficient encryption scheme. Gain insights into the protocol's performance, including estimated battery life on a Hamilton sensor, and understand how JEDI can be applied to existing IoT messaging systems with modest overhead.

Syllabus

Intro
IoT Systems use Decentralized Delegation
Joining Encryption and Delegation for lot
Decentralized Delegation CECF01, AKCCK17
Preliminary JEDI Design Using ABE
Encrypt Using Current Time
Time is Another Hierarchy
Hamilton Platform [KACKZMC18]
Energy Cost of ABE
Choosing a More Efficient Encryption Scheme
How JEDI Uses WKD-IBE
Cryptographic Improvements to WKD-IBE
Implementation
Estimated Battery Life on a Hamilton Sensor
Conclusion


Taught by

USENIX

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera