@article{2645, author = {Ramesh, C. H, Vasumathi, D, Venugopal Rao, K}, title = {Comparitive Analysis of Applications of Identity-Based Crptosystem in IoT}, journal = {Information Security Education Journal}, year = {2018}, volume = {5}, number = {2}, doi = {10.6025/isej/2018/5/2/63-70}, url = {http://www.dline.info/isej/fulltext/v5n2/isejv5n2_3.pdf}, abstract = {Although it has been with us in some form and under different names for many years, the Internet of Things (IoT) is suddenly the thing. The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety. As every player with a stake in IoT is well aware, security is paramount for the safe and reliable operation of IoT connected devices. In this aspect Identity-Based Cryptography which makes use of user identity attributes, such as email addresses or phone numbers, instead of digital certificates, for encryption and signature verification is promising in Internet of Things (IoT) due to its benefits, such as facilitating public key management. However, different aspects on IBC (e.g. the need for bilinear pairing) require attention when applied to IoT in order to meet basic security requirements on these environments. This paper gives a detailed feasibility study of applicability of IBC in IoT.}, }