TY - GEN
T1 - Securing communication in inter domains Internet of Things using identity-based cryptography
AU - Anggorojati, Bayu
AU - Prasad, Ramjee
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/2
Y1 - 2017/7/2
N2 - The advance of Internet and smart devices, which is often called Internet of Things (IoT), has made the interaction between virtual and physical worlds to be more seamless. IoT allows the information collected by smart devices to be transmitted to the people across the globe through Internet and enhancing people's lives in many aspects, such as health, energy, transportation, etc. In IoT, the communication between device-to-device or device-to-people very often go through different domains each having separate trust authority. Therefore, maintaining trust in the federated network of IoT is really important. However, IoT is vulnerable to numerous threats like tampering of information and key distribution issue, while considering the constraint in its resource. This paper proposes a method to secure communication that manages trust of IoT in federated fashion while minimizing usage of resources in IoT devices. Other aspects of loosely/tightly coupled network federation, dynamic nature of IoT devices in the network and the security analysis will also be discussed in the paper.
AB - The advance of Internet and smart devices, which is often called Internet of Things (IoT), has made the interaction between virtual and physical worlds to be more seamless. IoT allows the information collected by smart devices to be transmitted to the people across the globe through Internet and enhancing people's lives in many aspects, such as health, energy, transportation, etc. In IoT, the communication between device-to-device or device-to-people very often go through different domains each having separate trust authority. Therefore, maintaining trust in the federated network of IoT is really important. However, IoT is vulnerable to numerous threats like tampering of information and key distribution issue, while considering the constraint in its resource. This paper proposes a method to secure communication that manages trust of IoT in federated fashion while minimizing usage of resources in IoT devices. Other aspects of loosely/tightly coupled network federation, dynamic nature of IoT devices in the network and the security analysis will also be discussed in the paper.
KW - Authentication
KW - ID-based cryptography
KW - IoT
KW - federation
UR - http://www.scopus.com/inward/record.url?scp=85050773669&partnerID=8YFLogxK
U2 - 10.1109/IWBIS.2017.8275115
DO - 10.1109/IWBIS.2017.8275115
M3 - Conference contribution
AN - SCOPUS:85050773669
T3 - Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security
SP - 137
EP - 142
BT - Proceedings - WBIS 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 International Workshop on Big Data and Information Security, WBIS 2017
Y2 - 23 September 2017 through 24 September 2017
ER -