A Security Framework for the Internet of Things Based on Public Key Infrastructure

Article Preview

Abstract:

This paper proposed a security framework for the internet of things based on Public Key Infrastructure (PKI) which aims to answer these questions that how to solve the security problem in the internet of things between the client operation and service operation. It illustrates the model by presenting a modified security framework for a variety of applications than traditional PKI framework. Our aim is to show the new security framework in the internet of things that the traditional internet network does not have.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 671-674)

Pages:

3223-3226

Citation:

Online since:

March 2013

Authors:

Export:

Price:

[1] C. E. Shannon. Communication Theory of Communication, Bell Syst Tech.J., Vol. 28, pp.656-715, (1949).

Google Scholar

[2] W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Information Theory, 1976, 22, pp.644-654.

DOI: 10.1109/tit.1976.1055638

Google Scholar

[3] R. L. Rivest, A. Shamir, and L. Aldleman. A menthod for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM, 21(1978), 120-126.

DOI: 10.1145/359340.359342

Google Scholar

[4] M. O. Rabin. Digital signatures and public-key functions as intractible as factorization. Technical report LCS/TR-212, MIT Labrary for Computer Science, (1979).

Google Scholar

[5] T. ElGamal. A public-key cryptosystem and a signature based on discrete logarithms. IEEE Tansactions on Information Theory, 31(1985), 469-472.

DOI: 10.1109/tit.1985.1057074

Google Scholar

[6] N. Koblitz. Ellipic curve cryptosystems. Mathematics of Computation, 48(1987)203-209.

Google Scholar

[7] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography, CRC Press, (1997).

Google Scholar

[8] V. M¨oller. Use of ellipitic curvers in cryptography. In Adcances in Cryptology-Crypto'85, LNCS 218, pp.417-426. Springer-Verlag, (1986).

Google Scholar

[9] L. M. Kohnfelder. Towards a Practical Public-key Cryptosystem. Bachelor's thesis, Department of Computer Science, Massachusetts Institute of Technology, Cambridge, MA (June 1978).

Google Scholar

[10] M. Bellare and P. Rogaway, Minimizing the use of random oracles in authenticated encryption chemes, Information and Communications Security, Lecture Notes in Computer Science, vol. 1334 (1997), 1-16. 213.

DOI: 10.1007/bfb0028457

Google Scholar

[11] ANSI X9. 63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport using Elliptic Curve Cryptography, American National Standards Institute, 2001. 213, 214.

DOI: 10.1002/9781118482261.ch5

Google Scholar