Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
The Weil Pairing, and Its Efficient Calculation
Journal of Cryptology
Elliptic Curves: Number Theory and Cryptography, Second Edition
Elliptic Curves: Number Theory and Cryptography, Second Edition
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Evaluating 16-bit processors for elliptic curve cryptography
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In this paper we discuss the suitability of Identity Based (IDB) Cryptosystems to solve privacy and security issues in Machine to Machine (M2M) communications for Internet of Things (IoT) applications. Present day Information and Communication Technology is driven by smart digital devices connected to each other via Internet. The purpose of IoT is to control or access these smart digital devices through the Internet securely. So for this, we suggest IDB which is essentially certificate less. This interesting concept was first developed by Shamir [15] for Identity based signature scheme. Later on Boneh and Franklin et.al [11] extended this concept to develop schemes for encryption and decryption based on Weil pairing on elliptic curves. Presently IDB has emerged as an international standard (IEEE 1363.3). We have partially implemented Standard 1363.3 in JAVA with a view to port it onto mobile phones. Our intension is to use mobile phones as nodes of M2M communications for IoT applications. We have chosen elliptic curve parameters in such a way that algorithms when ported onto mobiles (mobiles with Android OS) perform within expected speed limits and also consume less power (light weight). The paper discusses various privacy and security issues related to M2M communication and shows how these issues can be resolved using IDB. The paper concludes with performance results and future work.