Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive presentation on JEDI (Joining Encryption and Delegation for IoT), a many-to-many end-to-end encryption protocol designed for Internet of Things (IoT) systems. Delve into the challenges of securing communication in large-scale IoT environments like smart buildings and cities, where multiple principals interact indirectly via intermediaries. Learn how JEDI addresses these challenges by encrypting and signing messages end-to-end while conforming to the decoupled communication model typical of IoT systems. Discover the protocol's key features, including support for expiry, fine-grained data access, and the ability for principals to delegate restricted keys to other principals. Examine the careful protocol design and implementation that enables JEDI to run across a spectrum of IoT devices, including ultra low-power deeply embedded sensors with severe CPU, memory, and energy constraints. Follow the presenter's journey from the preliminary design using Attribute-Based Encryption (ABE) to the final implementation using a more efficient encryption scheme. Gain insights into the protocol's performance, including estimated battery life on a Hamilton sensor, and understand how JEDI can be applied to existing IoT messaging systems with modest overhead.

Syllabus

Intro
IoT Systems use Decentralized Delegation
Joining Encryption and Delegation for lot
Decentralized Delegation CECF01, AKCCK17
Preliminary JEDI Design Using ABE
Encrypt Using Current Time
Time is Another Hierarchy
Hamilton Platform [KACKZMC18]
Energy Cost of ABE
Choosing a More Efficient Encryption Scheme
How JEDI Uses WKD-IBE
Cryptographic Improvements to WKD-IBE
Implementation
Estimated Battery Life on a Hamilton Sensor
Conclusion

Taught by

USENIX

Reviews

Start your review of JEDI - Many-to-Many End-to-End Encryption and Key Delegation for IoT

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.