Table Of ContentComputer Science & Engineering / Cryptography & Coding Theory
S Security for Wireless
z
yP
… an excellent starting point for practitioners in the industry and students in academia ga
et
to come up to speed with security issues in wireless sensor networks. ni
l Sensor Networks
d
—Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff,
a
Bell Laboratories, Alcatel-Lucent
using Identity-Based
Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things.
Yet these sensors are connected by a network that can be subverted by hostile parties,
risking that their output could be diverted or false information inserted. Given the
Cryptography
vast number of sensors to be deployed, cryptographic identity systems may be the only
manageable approach to trusting our senses. S
—Dean Willis, Chair, IETF SIP Working Group, 1999–2009 E
UC
U
S
… a valuable reference on IBC theory and practice that researchers and practitioners IR
N
I
will want on their bookshelves for many years. In addition, it will certainly stimulate T
G
Y
new directions in research in wireless network security.
I
—Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009–2011 DF
EO
NR
Security for Wireless Sensor Networks using Identity-Based Cryptography T W
I
introduces identity-based cryptographic schemes for wireless sensor networks. It T
I
YR
starts with an exhaustive survey of the existing layered approach to WSN security—
-E
B
detailing its pros and cons. Next, it examines new attack vectors that exploit the L
AE
layered approach to security. SS
ES
D
After providing the necessary background, the book presents a cross-layer design S
CE
approach that addresses authentication, integrity, and encryption. It also examines
RN
new ID-based key management mechanisms using a cross-layer design perspective. In YS
addition, secure routing algorithms using ID-based cryptography are also discussed. PO
T
R
Supplying readers with the required foundation in elliptic curve cryptography and O
identity-based cryptography, the authors consider new ID-based security solutions to GN
RE
overcome cross layer attacks in WSN. T
A
PW
Examining the latest implementations of ID-based cryptography on sensors, the book HO
YR
combines cross-layer design principles along with identity-based cryptography to
K
provide you with a new set of security solutions that can boost storage, computation, S
and energy efficiency in your wireless sensor networks.
Harsh Kupwade Patil
K13162 Stephen A. Szygenda
ISBN: 978-1-4398-6901-7
90000
www.crcpress.com
9 781439 869017
www.auerbach-publications.com
K13162 cvr mech.indd 1 9/5/12 9:56 AM
Comments from Accomplished People in the Field on
Security for Wireless Sensor Networks using
Identity-Based Cryptography
Security for Wireless Sensor Networks using Identity-Based Cryptography provides a step-by-
step approach to everything you’ll need to know about wireless sensor network security.
The book also has information about many topics relevant to wireless sensor network
security planning, design, and implementation of Identity-Based Cryptography, which
is a superior security solution with better resistance against known attacks.
—John R. Vacca
Author, Professional Writer, Editor, Reviewer and IT Consultant
Getting the right balance of systems security is a hard enough task in traditional net-
working, let alone securing a wireless network composed of sensors with high resource
limitations that, nonetheless, can collaborate to perform complex tasks. This book
serves as an excellent starting point for practitioners in the industry and students in
academia to come up to speed with security issues in wireless sensor networks.
—Vijay K. Gurbani, Ph.D.
Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent
Adjunct Professor, Department of Computer Science, Illinois Institute of Technology
Strong identity mechanisms are a hard sell for today’s Net because people feel that
they know who they’re talking to. In the Internet of Things with its focus on unfeeling
machine-to-machine communications, we must replace “feeling secure” with actually
being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet
of Things. Yet these sensors are connected by a network that can be subverted by hostile
parties, risking that their output could be diverted or false information inserted. Given
the vast number of sensors to be deployed, cryptographic identity systems may be the
only manageable approach to trusting our senses.
—Dean Willis
Chair, IETF SIP Working Group, 1999-2009
TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk
Security for Wireless
Sensor Networks
using Identity-Based
Cryptography
K13162_FM.indd 1 9/6/12 3:27 PM
TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk
Security for Wireless
Sensor Networks
using Identity-Based
Cryptography
Harsh Kupwade Patil
Stephen A. Szygenda
K13162_FM.indd 3 9/6/12 3:27 PM
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2013 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Version Date: 20120829
International Standard Book Number-13: 978-1-4398-6902-4 (eBook - PDF)
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a pho-
tocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Dedication xi
Foreword xiii
Preface xv
Acknowledgments xvii
About the Authors xix
Chapter 1 Introduction to Wireless Sensor Networks 1
In This Chapter 1
1.1 Introduction 1
1.1.1 WSN Applications 2
1.2 History of WSN 3
1.3 WSN Architecture 5
1.3.1 Homogenous Sensor Networks 6
1.3.2 Heterogeneous Sensor Networks 8
1.4 Architecture of Sensor Nodes 8
1.5 The Protocol Stack in WSN 9
1.6 MANET Versus WSN 11
1.6.1 Similarities Between MANET and WSN 11
1.6.2 Differences Between MANET and WSN 12
1.7 Challenges in WSN 12
1.7.1 Battery Life and Power Consumption 12
1.7.2 Power Conservation Mechanism 13
v
vi Security for Wireless Sensor Networks using Identity-Based Cryptography
1.7.3 Communication Media 14
1.7.4 Integrated Circuit (IC) Technology 14
1.8 The Routing Problem in WSN 14
1.9 Broadcasting and Multicasting 15
1.9.1 Broadcasting 15
1.9.2 Network Discovery 16
1.9.3 Data Aggregation in WSN 16
1.10 Summary 17
1.11 References 17
Chapter 2 Security in Wireless Sensor Networks 19
In This Chapter 19
2.1 Introduction 19
2.2 Attacks on WSN 20
2.2.1 Threats to Privacy 20
2.2.2 Threats to Control 23
2.2.3 Threats to Availability 26
2.2.4 Attacks Specific to WSN 28
2.3 Countermeasures to Attacks in WSN 29
2.3.1 Security in WSN Using a Layered Approach 30
2.4 Summary 32
2.5 References 32
Chapter 3 Elliptic Curve Cryptography 33
In This Chapter 33
3.1 Introduction 33
3.2 Introduction to Modern Algebra 34
3.2.1 Groups 34
3.2.2 Rings 35
3.2.3 Fields 36
3.3 Prime Fields 36
3.4 Binary Fields 37
3.5 Elliptic Curve Cryptography 37
3.5.1 Discrete log Problem 40
3.5.2 Weierstrass Equations 41
3.5.3 Prime Curves 43
3.5.4 Binary Curves 44
3.5.5 Group Law 45
Contents vii
3.6 Why Elliptic Curve Cryptography? 48
3.7 Elliptic Curve Discrete Log Problem 48
3.8 Torsion Points 49
3.9 Pairing-Based Cryptography 50
3.9.1 Divisor Theory 50
3.9.2 Rational Function 51
3.9.3 Weil Pairing 53
3.9.4 Bilinear Property 54
3.9.5 Tate Pairing 55
3.10 Summary 55
3.11 References 55
Chapter 4 Identity-Based Cryptography 57
In This Chapter 57
4.1 Introduction 57
4.1.1 Symmetric Key Cryptographic Systems 59
4.1.2 Asymmetric Key Cryptographic Systems 60
4.2 Public Key Infrastructure 62
4.2.1 Single-Certificate Authority Model 62
4.2.2 A Hierarchy of Certificate Authorities 63
4.2.3 Pros and Cons of PKI 65
4.3 Identity-Based Cryptography 66
4.3.1 Computational Problems 69
4.3.2 Identity-Based Encryption Schemes 71
4.3.3 Hierarchical Identity-Based Encryption Scheme 75
4.3.4 Identity-Based Authentication Schemes 78
4.3.5 Key Distribution in IBC 84
4.3.6 Key Escrow Problem 84
4.3.7 Threshold Signature Scheme 86
4.4 Summary 89
4.5 References 90
Chapter 5 Identity-Based Authentication and Encryption in
Wireless Sensor Networks 93
In This Chapter 93
5.1 Introduction 93
5.2 Related Work 95
5.2.1 SPINS 95