Identity-based Encryption for device-to-device Security in IOT Environments
Languages of publication
The Internet of Things (IOT) is presently a fast catching paradigm in which the everyday objects are manufactured with essential capabilities such sensing, networking and processing. These capabilities enable them to communicate with one another and with other devices and services over the Internet to complete some objective. One of the most important issues is security. When devices are given the freedom to talk to each other, then there are immense possibilities of misuse. In this paper, we propose a secure communication approach for device-to-device communication. It is an Identity-based encryption approach which includes revocation of keys if misuse is detected. The proposed method takes into consideration the high probability of misuse and hence malicious devices are identified and eliminated. This paper presents the design of the proposed approach along with a first level implementation using Java and MsAccess.
-  Harald Sundmaeker, Peter Friess, Patrick Guillemin, Sylvie Woelfflé, Vision and Challenges for Realising the Internet of Things, Cluster of European Research Projects on the Internet of Things, March 2010. Publications Office of the European Union, 2010 ISBN 978-92-79-15088-3, doi:10.2759/26127
-  Rajeev Alur, Emery Berger, Limor Fix, Kevin Fu, Gregory D. Hager, Klara Nahrstedt, Elizabeth Mynatt, Shwetak Patel, Daniel Lopresti, Jennifer Rexford, John A. Stankovic, Ann W. Drobnis, and Benjamin Zorn, Systems Computing Challenges in the Internet of Things, computing community consortium, September 22, 2015. arXiv:1604.02980
-  Carolyn Marsan, Michelle Speckler, The internet of things: An overview. Internet Society, October 2015.
-  J. Li, J. Li, X. Chen, C. Jia and W. Lou, Identity-Based Encryption with Outsourced Revocation in Cloud Computing, in IEEE Transactions on Computers, vol. 64, no. 2, pp. 425-437, Feb. 2015, doi: 10.1109/TC.2013.208
-  Alexandra Boldyreva, Vipul Goyal, Virendra Kumar, Identity-based Encryption with Eﬃcient Revocation, 14th ACM Conference on Com- puter and Communications Security, CCS 2008, ACM Press, 2008.
-  Ryuichi Sakai, Maseo Kasahara, ID based cryptosystems with paring on elliptic curve, Osaka Electro Communication University, Japan.
-  Herbert Schildt, java complete references, Tata Mc Graw Hill Ltd, New Delhi, 2008.
-  Mr. Gordon Moore, Dr. Jahangir Alam, Velma Latson, www.tutorialspoint.com
-  www.java-examples.com
-  www.beginnerbook.com
Publication order reference