ISBN-13: 9786203929997 / Angielski / Miękka / 152 str.
Recently numerous IBC (Identity Based Cryptography) based authentic key establishment procedure constructed on the top of the usage of ECC (Elliptic Curve Cryptography) suggested and proposed. Such key agreement/establishment protocols that are vulnerable to many active attacks and passive attacks such as temporary information attack (session-specific), session key- off-set attack etc. Planned approach provides authenticated key exchange between the communicating parties by sending the secret information approve on the session key which is used for secret communication. The main focus of proposed methodology for mobile devices considering as nodes for machine to machine communication for Internet on things (IoT). In wireless communication, when number of nodes are involved in the communication then there is chance of reveal of information. This is because the nodes available in the network are not trusted node and they can leak the secret information. So the secret information from sender to receiver node is not secure, such schemes are useful for limited computing devices (constrained devices) such as smart phone, smart cards, wireless sensor node, PDA's .