YoVDO

JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Access Control Courses IoT security Courses

Course Description

Overview

Explore a comprehensive presentation on JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol designed for Internet of Things (IoT) systems. Delve into the challenges of securing communication in large-scale IoT environments like smart buildings and cities, where multiple principals interact indirectly via intermediaries. Learn how JEDI addresses these challenges by encrypting and signing messages end-to-end while conforming to the decoupled communication model typical of IoT systems. Discover the protocol's key features, including support for expiry, fine-grained data access, and the ability for principals to delegate restricted keys to other principals. Examine the careful protocol design and implementation that enables JEDI to run across a spectrum of IoT devices, including ultra low-power deeply embedded sensors with severe CPU, memory, and energy constraints. Follow the presenter's journey from the preliminary design using Attribute-Based Encryption (ABE) to the final implementation using a more efficient encryption scheme. Gain insights into the protocol's performance, including estimated battery life on a Hamilton sensor, and understand how JEDI can be applied to existing IoT messaging systems with modest overhead.

Syllabus

Intro
IoT Systems use Decentralized Delegation
Joining Encryption and Delegation for lot
Decentralized Delegation CECF01, AKCCK17
Preliminary JEDI Design Using ABE
Encrypt Using Current Time
Time is Another Hierarchy
Hamilton Platform [KACKZMC18]
Energy Cost of ABE
Choosing a More Efficient Encryption Scheme
How JEDI Uses WKD-IBE
Cryptographic Improvements to WKD-IBE
Implementation
Estimated Battery Life on a Hamilton Sensor
Conclusion


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube