[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 4, Issue 1 (9-2015) ::
منادی 2015, 4(1): 39-46 Back to browse issues page
Identity Based Cryptography In WSN
Abstract:   (4288 Views)

Users of wireless sensor networks face difficulties like key distribution. Also there is a large number of keys saved in them. Thus, they tended to use public key cryptography for identification and key agreement. On the other hand, certificate-based public key cryptography makes use of public key infrastructure (PKI). Clearly implementing PKI requires a large amount of memory computations and communications which are impassible for sensor networks. To solve this problem we can use identity based cryptography (IBC). In this type of cryptography, user’s public identities like their IP or email addresses are used as their public key as a result, there will be no need for PKI. After introduction of pairing based cryptography, this type of cryptography was applicable used. In this paper, we will take a look at how to use pairings on wireless sensor networks.

Keywords: Identity Based Cryptography, wireless sensor networks, elliptic curve, scalar multiplication, pairing.‎
Full-Text [PDF 1298 kb]   (1564 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2016/01/4 | Accepted: 2016/08/14 | Published: 2016/08/14
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Identity Based Cryptography In WSN. منادی 2015; 4 (1) :39-46
URL: http://monadi.isc.org.ir/article-1-45-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 1 (9-2015) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.07 seconds with 39 queries by YEKTAWEB 4645