Proceedings of the First International Conference on Security of Internet of Things 2012
DOI: 10.1145/2490428.2490438
|View full text |Cite
|
Sign up to set email alerts
|

An identity based encryption using elliptic curve cryptography for secure M2M communication

Abstract: In this paper we discuss the suitability of Identity Based (IDB) Cryptosystems to solve privacy and security issues in Machine to Machine (M2M) communications for Internet of Things (IoT) applications. Present day Information and Communication Technology is driven by smart digital devices connected to each other via Internet. The purpose of IoT is to control or access these smart digital devices through the Internet securely. So for this, we suggest IDB which is essentially certificate less. This interesting c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 11 publications
(5 reference statements)
0
20
0
Order By: Relevance
“…In particular, they have proposed a Secure MQTT (SMQTT). Their proposed solution is based on lightweight Attribute Based Encryption (ABE) [22], [23] over elliptic curves [35]. They have used ABE because of its inherent design supporting broadcast encryption that is suitable for IoT applications.…”
Section: A M2m Communication Protocols For Iiotmentioning
confidence: 99%
“…In particular, they have proposed a Secure MQTT (SMQTT). Their proposed solution is based on lightweight Attribute Based Encryption (ABE) [22], [23] over elliptic curves [35]. They have used ABE because of its inherent design supporting broadcast encryption that is suitable for IoT applications.…”
Section: A M2m Communication Protocols For Iiotmentioning
confidence: 99%
“…To envisage anonymous pub-sub architecture, we use fully attribute hiding Hierarchical Inner Product Encryption (HIPE) [3] based on elliptic curve cryptography (ECC) [16]. In a nutshell, IPE is a public key cryptosystem wherein private keys and attributes are associated with predicate vector and ciphertext respectively.…”
Section: Hierarchical Inner Product Encryption In a Nutshellmentioning
confidence: 99%
“…If the decryption fails, the subscriber doesn't subscribe to any topic. Note that HIPE is implemented in JAVA based on [3], [16].…”
Section: Implementation Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…1,3,6 In this section, we present a brief introduction of ECC. It is one of the most powerful members of PKC family which is based on algebraic structure of elliptic curves over finite fields.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%