The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Analysis of Identity-Based Cryptography in Internet of Things (IoT)
|
Author(s): Aravind Karrothu (Vellore Institute of Technology, India)and Jasmine Norman (Vellore Institute of Technology, India)
Copyright: 2020
Pages: 19
Source title:
Architecture and Security Issues in Fog Computing Applications
Source Author(s)/Editor(s): Sam Goundar (British University Vietnam, Vietnam), S. Bharath Bhushan (Sree Vidyanikethan Engineering College, Tirupati, India)and Praveen Kumar Rayani (National Institute of Technology, Durgapur, India)
DOI: 10.4018/978-1-7998-0194-8.ch004
Purchase
|
Abstract
Fog networking supports the internet of things (IoT) concept, in which most of the devices used by humans on a daily basis will be connected to each other. Security issues in fog architecture are still a major research area as the number of security threats increases every day. Identity-based encryption (IBE) has a wide range of new cryptographic schemes and protocols that are particularly found to be suitable for lightweight architecture such as IoT and wireless sensor networks. This chapter focuses on these schemes and protocols in the background of wireless sensor networks. Also, this chapter analyses identity-based encryption schemes and the various attacks they are prone to.
Related Content
A. Ashwini, S. Balasubramaniam, Seifedine Kadry.
© 2025.
26 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
20 pages.
|
A. Ashwini, V. Kavitha, S. Balasubramaniam, B. Sundaravadivazhagan.
© 2025.
30 pages.
|
Abhinav Kumar, Anindya Bag, Aseem Anand, Siddhant Saha, Hitesh Mohapatra, Manjur Kolhar.
© 2025.
22 pages.
|
Bhupinder Singh, Christian Kaunert.
© 2025.
22 pages.
|
M. Abinaya.
© 2025.
30 pages.
|
Dipti Chauhan, Jay Kumar Jain.
© 2025.
28 pages.
|
|
|