Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks

Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks
Author:
Publisher:
Total Pages:
Release: 2004
Genre:
ISBN:

Elliptic Curve Cryptography (ECC) has been a very interesting research field for many applications, especially in sensor networks. The main reason for this is the restrictions on resources posed by sensor motes. ECC alleviates these restrictions by using small prime fields. At the same time, the evolution of hardware technology has built new, sophisticated motes with more capabilities which open new ways for sensor network applications. In our work, we are extending the TinyECC package, initially written by An Liu, which provides elliptic curve cryptography functionality on sensor motes running TinyOS. We extend this package by porting it to new powerful motes, called Imote2s by Intel. We also further implement Bilinear Pairing which is the most important part of Identity-Based Cryptography. Furthermore, we evaluate and prove the feasibility of using pairing on next generation sensor motes. There are various ways that Bilinear Pairing could be used in Identity-Based cryptosystems, so in this way we insert Identity-Based Cryptography in the area of security for sensor networks. Additionally, we propose a scheme that can establish keys on sensor networks using Identity-Based Cryptography. We believe that our study will open the way and motivate further research in the field and contribute in providing more robust and secure sensor networks.

Identity-based Cryptography

Identity-based Cryptography
Author: Panagiotis T. Kampanakis
Publisher:
Total Pages: 54
Release: 2007
Genre:
ISBN:

Keywords: Identity Based Cryptography, imote2, sensor networks, Tate pairing.

Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography
Author: Harsh Kupwade Patil
Publisher: CRC Press
Total Pages: 235
Release: 2013-03-21
Genre: Computers
ISBN: 1466581263

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Security for Multihop Wireless Networks

Security for Multihop Wireless Networks
Author: Shafiullah Khan
Publisher: CRC Press
Total Pages: 540
Release: 2014-04-15
Genre: Computers
ISBN: 1466578033

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

Identity-based Cryptography

Identity-based Cryptography
Author: Marc Joye
Publisher: IOS Press
Total Pages: 272
Release: 2009
Genre: Computers
ISBN: 1586039474

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still keeps cryptographers busy today. Some cryptographic primitives, like signatures, were easily adapted to this new "identity-based" setting, but for others, including encryption, it was not until recently that the first practical solutions were found. The advent of pairings to cryptography caused a boom in the current state-of-the-art is this active subfield from the mathematical background of pairing and the main cryptographic constructions to software and hardware implementation issues. This volume bundles fourteen contributed chapters written by experts in the field, and is suitable for a wide audience of scientists, grad students, and implementors alike." --Book Jacket.

Proceedings of the 4th International Conference on Computer Engineering and Networks

Proceedings of the 4th International Conference on Computer Engineering and Networks
Author: W. Eric Wong
Publisher: Springer
Total Pages: 1252
Release: 2015-01-06
Genre: Technology & Engineering
ISBN: 3319111043

This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related areas. The book presents papers from the 4th International Conference on Computer Engineering and Networks (CENet2014) held July 19-20, 2014 in Shanghai, China.

RFID and Sensor Networks

RFID and Sensor Networks
Author: Yan Zhang
Publisher: CRC Press
Total Pages: 646
Release: 2009-11-04
Genre: Business & Economics
ISBN: 9781420077780

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there

Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future

Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future
Author: Marco Aiello
Publisher: Springer Nature
Total Pages: 282
Release: 2021-04-09
Genre: Computers
ISBN: 3030732037

This book is a festschrift in honour of Mike Papazoglou’s 65th birthday and retirement. It includes 20 contributions from leading researchers who have worked with Mike in his more than 40 years of academic research. Topics are as varied as Mike’s and include service engineering, service management, services and human, IoT, and data-driven services.

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1924
Release: 2020-09-30
Genre: Computers
ISBN: 1799853527

Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Security and Privacy Assurance in Advancing Technologies: New Developments

Security and Privacy Assurance in Advancing Technologies: New Developments
Author: Nemati, Hamid
Publisher: IGI Global
Total Pages: 494
Release: 2010-11-30
Genre: Computers
ISBN: 1609602021

"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.