Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Research Topics for Identity-based Encryption in Internet of Things

Research Topics for Identity-based Encryption in Internet of Things

PhD Research Topics for Identity-based Encryption in Internet of Things

   Identity-based encryption is an alternative to public-key cryptography in which primitive ID-based private keys are employed for securing communication. In the identity-based encryption model, the sender encrypts the ID based on the public keys, and the receiver can decrypt the ID using the secret key obtained from a centralized server. An identity-based encryption scheme plays an important role in securing communications among IoT users. The IoT users explore an identity-based private key for data encryption
   An identity-based encryption scheme is developed to solve the issues in conventional public-key cryptography schemes. It explores the personal attributes of the IoT device, such as phone numbers, email addresses, register numbers as public keys. It helps diminish the difficulty of providing digital certificates in large-scale networks. An efficient identity-based encryption work should satisfy (i) anonymity of IoT devices; (ii) identity-based signature for data integrity; and (iii) performance merits of such identity-based schemes over other cryptographic tools. The major advantage of using identity-based encryption on IoT is that there are only limited users. It neglects the key distribution process of public key infrastructure. The public keys are secured with implicit authentication.