ebook img

Security for Wireless Sensor Networks using Identity-Based Cryptography PDF

230 Pages·2012·3.064 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security for Wireless Sensor Networks using Identity-Based Cryptography

Computer Science & Engineering / Cryptography & Coding Theory S Security for Wireless z yP … an excellent starting point for practitioners in the industry and students in academia ga et to come up to speed with security issues in wireless sensor networks. ni l Sensor Networks d —Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff, a Bell Laboratories, Alcatel-Lucent using Identity-Based Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the Cryptography vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses. S —Dean Willis, Chair, IETF SIP Working Group, 1999–2009 E UC U S … a valuable reference on IBC theory and practice that researchers and practitioners IR N I will want on their bookshelves for many years. In addition, it will certainly stimulate T G Y new directions in research in wireless network security. I —Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009–2011 DF EO NR Security for Wireless Sensor Networks using Identity-Based Cryptography T W I introduces identity-based cryptographic schemes for wireless sensor networks. It T I YR starts with an exhaustive survey of the existing layered approach to WSN security— -E B detailing its pros and cons. Next, it examines new attack vectors that exploit the L AE layered approach to security. SS ES D After providing the necessary background, the book presents a cross-layer design S CE approach that addresses authentication, integrity, and encryption. It also examines RN new ID-based key management mechanisms using a cross-layer design perspective. In YS addition, secure routing algorithms using ID-based cryptography are also discussed. PO T R Supplying readers with the required foundation in elliptic curve cryptography and O identity-based cryptography, the authors consider new ID-based security solutions to GN RE overcome cross layer attacks in WSN. T A PW Examining the latest implementations of ID-based cryptography on sensors, the book HO YR combines cross-layer design principles along with identity-based cryptography to K provide you with a new set of security solutions that can boost storage, computation, S and energy efficiency in your wireless sensor networks. Harsh Kupwade Patil K13162 Stephen A. Szygenda ISBN: 978-1-4398-6901-7 90000 www.crcpress.com 9 781439 869017 www.auerbach-publications.com K13162 cvr mech.indd 1 9/5/12 9:56 AM Comments from Accomplished People in the Field on Security for Wireless Sensor Networks using Identity-Based Cryptography Security for Wireless Sensor Networks using Identity-Based Cryptography provides a step-by- step approach to everything you’ll need to know about wireless sensor network security. The book also has information about many topics relevant to wireless sensor network security planning, design, and implementation of Identity-Based Cryptography, which is a superior security solution with better resistance against known attacks. —John R. Vacca Author, Professional Writer, Editor, Reviewer and IT Consultant Getting the right balance of systems security is a hard enough task in traditional net- working, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks. —Vijay K. Gurbani, Ph.D. Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent Adjunct Professor, Department of Computer Science, Illinois Institute of Technology Strong identity mechanisms are a hard sell for today’s Net because people feel that they know who they’re talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace “feeling secure” with actually being secure.  Wireless sensors are  the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted.  Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses. —Dean Willis Chair, IETF SIP Working Group, 1999-2009 TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk Security for Wireless Sensor Networks using Identity-Based Cryptography K13162_FM.indd 1 9/6/12 3:27 PM TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil Stephen A. Szygenda K13162_FM.indd 3 9/6/12 3:27 PM CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20120829 International Standard Book Number-13: 978-1-4398-6902-4 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a pho- tocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Dedication xi Foreword xiii Preface xv Acknowledgments xvii About the Authors xix Chapter 1 Introduction to Wireless Sensor Networks 1 In This Chapter 1 1.1 Introduction 1 1.1.1 WSN Applications 2 1.2 History of WSN 3 1.3 WSN Architecture 5 1.3.1 Homogenous Sensor Networks 6 1.3.2 Heterogeneous Sensor Networks 8 1.4 Architecture of Sensor Nodes 8 1.5 The Protocol Stack in WSN 9 1.6 MANET Versus WSN 11 1.6.1 Similarities Between MANET and WSN 11 1.6.2 Differences Between MANET and WSN 12 1.7 Challenges in WSN 12 1.7.1 Battery Life and Power Consumption 12 1.7.2 Power Conservation Mechanism 13 v vi Security for Wireless Sensor Networks using Identity-Based Cryptography 1.7.3 Communication Media 14 1.7.4 Integrated Circuit (IC) Technology 14 1.8 The Routing Problem in WSN 14 1.9 Broadcasting and Multicasting 15 1.9.1 Broadcasting 15 1.9.2 Network Discovery 16 1.9.3 Data Aggregation in WSN 16 1.10 Summary 17 1.11 References 17 Chapter 2 Security in Wireless Sensor Networks 19 In This Chapter 19 2.1 Introduction 19 2.2 Attacks on WSN 20 2.2.1 Threats to Privacy 20 2.2.2 Threats to Control 23 2.2.3 Threats to Availability 26 2.2.4 Attacks Specific to WSN 28 2.3 Countermeasures to Attacks in WSN 29 2.3.1 Security in WSN Using a Layered Approach 30 2.4 Summary 32 2.5 References 32 Chapter 3 Elliptic Curve Cryptography 33 In This Chapter 33 3.1 Introduction 33 3.2 Introduction to Modern Algebra 34 3.2.1 Groups 34 3.2.2 Rings 35 3.2.3 Fields 36 3.3 Prime Fields 36 3.4 Binary Fields 37 3.5 Elliptic Curve Cryptography 37 3.5.1 Discrete log Problem 40 3.5.2 Weierstrass Equations 41 3.5.3 Prime Curves 43 3.5.4 Binary Curves 44 3.5.5 Group Law 45 Contents vii 3.6 Why Elliptic Curve Cryptography? 48 3.7 Elliptic Curve Discrete Log Problem 48 3.8 Torsion Points 49 3.9 Pairing-Based Cryptography 50 3.9.1 Divisor Theory 50 3.9.2 Rational Function 51 3.9.3 Weil Pairing 53 3.9.4 Bilinear Property 54 3.9.5 Tate Pairing 55 3.10 Summary 55 3.11 References 55 Chapter 4 Identity-Based Cryptography 57 In This Chapter 57 4.1 Introduction 57 4.1.1 Symmetric Key Cryptographic Systems 59 4.1.2 Asymmetric Key Cryptographic Systems 60 4.2 Public Key Infrastructure 62 4.2.1 Single-Certificate Authority Model 62 4.2.2 A Hierarchy of Certificate Authorities 63 4.2.3 Pros and Cons of PKI 65 4.3 Identity-Based Cryptography 66 4.3.1 Computational Problems 69 4.3.2 Identity-Based Encryption Schemes 71 4.3.3 Hierarchical Identity-Based Encryption Scheme 75 4.3.4 Identity-Based Authentication Schemes 78 4.3.5 Key Distribution in IBC 84 4.3.6 Key Escrow Problem 84 4.3.7 Threshold Signature Scheme 86 4.4 Summary 89 4.5 References 90 Chapter 5 Identity-Based Authentication and Encryption in Wireless Sensor Networks 93 In This Chapter 93 5.1 Introduction 93 5.2 Related Work 95 5.2.1 SPINS 95

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.