The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
, Security, privacy and trust in the Internet of Things: The road ahead. Computer Networks, vol.76, pp.146-164, 2015.
Report on pairing-based cryptography, J. of Research of the National Institute of Standards and Technology, vol.120, pp.11-27, 2015. ,
Identity-based cryptosystems and signature schemes, Advances in Cryptology -CRYPTO 1984, vol.196, pp.47-53, 1984. ,
Identity-based encryption from the Weil pairing, CRYPTO 2001, vol.2139, pp.213-229, 2001. ,
Short signatures from the Weil pairing, ASIACRYPT 2001, vol.2248, pp.514-532, 2001. ,
RELIC is an Efficient Library for Cryptography, 2013. ,
The elliptic curve digital signature algorithm (ECDSA), Int. J. of Information Security, vol.1, issue.1, pp.36-63, 2001. ,
, Pairings for cryptographers, vol.156, pp.3113-3121, 2008.
Secure integration of asymmetric and symmetric encryption schemes, CRYPTO 1999, vol.1666, pp.537-554, 1999. ,
Boneh-Franklin identity based encryption revisited, ICALP 2005, vol.3580, 2005. ,
Subgroup security in pairing-based cryptography, LATINCRYPT 2015, vol.9230, 2015. ,
On the Application of Pairing Based Cryptography to Wireless Sensor Networks, Proc. of the 2nd ACM Conf. on Wireless network security, pp.1-12, 2009. ,
Feasibility of Public Key Cryptography in Wireless Sensor Networks, J. of Theoretical Physics and Cryptography, vol.7, pp.20-24, 2014. ,
Towards the use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks, Proc. of the, 2015. ,
, Euromicro Conf. on Digital System Design, 2015.
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks, Computer Communications, vol.34, issue.3, pp.485-493, 2011. ,
, Privacy, Discovery and Authentication for the Internet of Things, vol.9879, pp.301-319, 2016.
On the Feasibility of Attribute Based Encryption on Internet of Things Devices, IEEE Micro, vol.36, issue.6, pp.25-35, 2016. ,