TY - JOUR JF - isc-monadi JO - منادی VL - 4 IS - 1 PY - 2015 Y1 - 2015/9/01 TI - Identity Based Cryptography In WSN TT - رمزنگاری مبتنی بر شناسه در شبکه‌های حسگر‎ ‎بی‌سیم N2 - Users of wireless sensor networks face difficulties like key distribution. Also there is a large number of keys saved in them. Thus, they tended to use public key cryptography for identification and key agreement. On the other hand, certificate-based public key cryptography makes use of public key infrastructure (PKI). Clearly implementing PKI requires a large amount of memory computations and communications which are impassible for sensor networks. To solve this problem we can use identity based cryptography (IBC). In this type of cryptography, user’s public identities like their IP or email addresses are used as their public key as a result, there will be no need for PKI. After introduction of pairing based cryptography, this type of cryptography was applicable used. In this paper, we will take a look at how to use pairings on wireless sensor networks. SP - 39 EP - 46 AD - KW - Identity Based Cryptography KW - wireless sensor networks KW - elliptic curve KW - scalar multiplication KW - pairing.‎ UR - http://monadi.isc.org.ir/article-1-45-en.html ER -