Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Comparative analysis of applications of identity-based cryptosystem in IoT

Comparative analysis of applications of identity-based cryptosystem in IoT The internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The transition from closed networks to enterprise IT networks to the public internet is accelerating at an alarming pace and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect us from intrusions and interference that could compromise personal privacy? Security is paramount for the safe and reliable operation of IoT connected devices. In this aspect, identity-based cryptography (IBC) plays a promising role in IoT due to its benefits, such as facilitating public key management. This paper gives a detailed feasibility study of applicability of IBC in IoT. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Electronic Government, an International Journal Inderscience Publishers

Comparative analysis of applications of identity-based cryptosystem in IoT

Loading next page...
 
/lp/inderscience-publishers/comparative-analysis-of-applications-of-identity-based-cryptosystem-in-WXTsvDdv0a
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1740-7494
eISSN
1740-7508
DOI
10.1504/EG.2017.088003
Publisher site
See Article on Publisher Site

Abstract

The internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The transition from closed networks to enterprise IT networks to the public internet is accelerating at an alarming pace and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect us from intrusions and interference that could compromise personal privacy? Security is paramount for the safe and reliable operation of IoT connected devices. In this aspect, identity-based cryptography (IBC) plays a promising role in IoT due to its benefits, such as facilitating public key management. This paper gives a detailed feasibility study of applicability of IBC in IoT.

Journal

Electronic Government, an International JournalInderscience Publishers

Published: Jan 1, 2017

There are no references for this article.