...ch offers better performance thansOther IBS schemes from pairings. This ensures a betterssecurity aid for communication. The internet of things issnothing but combination of sensors and connectivity.s=-=[4]-=-To support the authenticity of public keys in the publicskey cryptography, there are two main infrastructures calledspublic key infrastructure (PKI) and identity-basedscryptography (IBC) . In the PKI,...
...ncy identifications(RFID) tags, sensors, actuators, mobile phones, etc.-which,sthrough unique addressing schemes, are able tosview eachsother and collaborate with their neighbors to reach commonsgoals=-=[2]-=-. Wireless sensor networks (WSNs) are ad hocsnetworks whichsconsist of a large number of small sensorsnodes with restricted resources and one or more base stations.sUsually, sensor nodes consist of a ...
...tributed autonomous devices usingssensors to cooperatively monitor physical or environmentalsconditions, such as temperature, sound, vibration, pressure,smotion or pollutants, at different locations. =-=[3]-=-There are threesmethods to acheive this integration, front-end proxy solution,sgateway solution and TCP/IP overlay solution. In the front-send proxy solution, the base station acts as an interfacesbet...
...er and limited capacity. [6]Tosguarantee unforgeability, integrity and confidentiality ofscommunications, the traditional method is to digitally sign asmessage then followed by public key encryption. =-=[1]-=- On thesother hand, the base station is a powerful trusted device thatsacts as an medium between the network user and the nodes.[1]sWSNs have many applications, that includes military sensingsand trac...