PL EN


Preferences help
enabled [disable] Abstract
Number of results
2016 | 41 | 105-115
Article title

Identity-based Encryption for device-to-device Security in IOT Environments

Content
Title variants
Languages of publication
EN
Abstracts
EN
The Internet of Things (IOT) is presently a fast catching paradigm in which the everyday objects are manufactured with essential capabilities such sensing, networking and processing. These capabilities enable them to communicate with one another and with other devices and services over the Internet to complete some objective. One of the most important issues is security. When devices are given the freedom to talk to each other, then there are immense possibilities of misuse. In this paper, we propose a secure communication approach for device-to-device communication. It is an Identity-based encryption approach which includes revocation of keys if misuse is detected. The proposed method takes into consideration the high probability of misuse and hence malicious devices are identified and eliminated. This paper presents the design of the proposed approach along with a first level implementation using Java and MsAccess.
Year
Volume
41
Pages
105-115
Physical description
Contributors
author
  • Department of Computer Science & Engineering, Faculty of Engineering, Avinashilingam University, Coimbatore, India
  • Department of Printing Technology, Faculty of Engineering, Avinashilingam University, Coimbatore, India
References
  • [1] Harald Sundmaeker, Peter Friess, Patrick Guillemin, Sylvie Woelfflé, Vision and Challenges for Realising the Internet of Things, Cluster of European Research Projects on the Internet of Things, March 2010. Publications Office of the European Union, 2010 ISBN 978-92-79-15088-3, doi:10.2759/26127
  • [2] Rajeev Alur, Emery Berger, Limor Fix, Kevin Fu, Gregory D. Hager, Klara Nahrstedt, Elizabeth Mynatt, Shwetak Patel, Daniel Lopresti, Jennifer Rexford, John A. Stankovic, Ann W. Drobnis, and Benjamin Zorn, Systems Computing Challenges in the Internet of Things, computing community consortium, September 22, 2015. arXiv:1604.02980
  • [3] Carolyn Marsan, Michelle Speckler, The internet of things: An overview. Internet Society, October 2015.
  • [4] J. Li, J. Li, X. Chen, C. Jia and W. Lou, Identity-Based Encryption with Outsourced Revocation in Cloud Computing, in IEEE Transactions on Computers, vol. 64, no. 2, pp. 425-437, Feb. 2015, doi: 10.1109/TC.2013.208
  • [5] Alexandra Boldyreva, Vipul Goyal, Virendra Kumar, Identity-based Encryption with Efficient Revocation, 14th ACM Conference on Com- puter and Communications Security, CCS 2008, ACM Press, 2008.
  • [6] Ryuichi Sakai, Maseo Kasahara, ID based cryptosystems with paring on elliptic curve, Osaka Electro Communication University, Japan.
  • [7] Herbert Schildt, java complete references, Tata Mc Graw Hill Ltd, New Delhi, 2008.
  • [8] Mr. Gordon Moore, Dr. Jahangir Alam, Velma Latson, www.tutorialspoint.com
  • [9] www.java-examples.com
  • [10] www.beginnerbook.com
Document Type
article
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.psjd-d606ff67-d1ff-4c7e-a485-479ef7e3486d
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.