Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography
Author: Harsh Kupwade Patil
Publisher: CRC Press
Total Pages: 235
Release: 2013-03-21
Genre: Computers
ISBN: 1466581263

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks

Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks
Author:
Publisher:
Total Pages:
Release: 2004
Genre:
ISBN:

Elliptic Curve Cryptography (ECC) has been a very interesting research field for many applications, especially in sensor networks. The main reason for this is the restrictions on resources posed by sensor motes. ECC alleviates these restrictions by using small prime fields. At the same time, the evolution of hardware technology has built new, sophisticated motes with more capabilities which open new ways for sensor network applications. In our work, we are extending the TinyECC package, initially written by An Liu, which provides elliptic curve cryptography functionality on sensor motes running TinyOS. We extend this package by porting it to new powerful motes, called Imote2s by Intel. We also further implement Bilinear Pairing which is the most important part of Identity-Based Cryptography. Furthermore, we evaluate and prove the feasibility of using pairing on next generation sensor motes. There are various ways that Bilinear Pairing could be used in Identity-Based cryptosystems, so in this way we insert Identity-Based Cryptography in the area of security for sensor networks. Additionally, we propose a scheme that can establish keys on sensor networks using Identity-Based Cryptography. We believe that our study will open the way and motivate further research in the field and contribute in providing more robust and secure sensor networks.

Wireless Sensor Network Security

Wireless Sensor Network Security
Author: Javier López
Publisher: IOS Press
Total Pages: 320
Release: 2008
Genre: Computers
ISBN: 1586038133

Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems.

Identity-based Cryptography

Identity-based Cryptography
Author: Panagiotis T. Kampanakis
Publisher:
Total Pages: 54
Release: 2007
Genre:
ISBN:

Keywords: Identity Based Cryptography, imote2, sensor networks, Tate pairing.

Identity-based Cryptography

Identity-based Cryptography
Author: Marc Joye
Publisher: IOS Press
Total Pages: 272
Release: 2009
Genre: Computers
ISBN: 1586039474

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still keeps cryptographers busy today. Some cryptographic primitives, like signatures, were easily adapted to this new "identity-based" setting, but for others, including encryption, it was not until recently that the first practical solutions were found. The advent of pairings to cryptography caused a boom in the current state-of-the-art is this active subfield from the mathematical background of pairing and the main cryptographic constructions to software and hardware implementation issues. This volume bundles fourteen contributed chapters written by experts in the field, and is suitable for a wide audience of scientists, grad students, and implementors alike." --Book Jacket.

Identity and Privacy in the Internet Age

Identity and Privacy in the Internet Age
Author: Audun Jøsang
Publisher: Springer Science & Business Media
Total Pages: 311
Release: 2009-09-29
Genre: Computers
ISBN: 3642047653

This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more.

Security in Wireless Ad Hoc and Sensor Networks

Security in Wireless Ad Hoc and Sensor Networks
Author: Erdal Cayirci
Publisher: John Wiley & Sons
Total Pages: 280
Release: 2008-12-30
Genre: Technology & Engineering
ISBN: 9780470516775

This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing Contains information on cryptographic primitives and electronic warfare Includes problems at the end of each chapter to enhance learning. This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.

Computational Intelligence in Sensor Networks

Computational Intelligence in Sensor Networks
Author: Bijan Bihari Mishra
Publisher: Springer
Total Pages: 496
Release: 2018-05-22
Genre: Technology & Engineering
ISBN: 366257277X

This book discusses applications of computational intelligence in sensor networks. Consisting of twenty chapters, it addresses topics ranging from small-scale data processing to big data processing realized through sensor nodes with the help of computational approaches. Advances in sensor technology and computer networks have enabled sensor networks to evolve from small systems of large sensors to large nets of miniature sensors, from wired communications to wireless communications, and from static to dynamic network topology. In spite of these technological advances, sensor networks still face the challenges of communicating and processing large amounts of imprecise and partial data in resource-constrained environments. Further, optimal deployment of sensors in an environment is also seen as an intractable problem. On the other hand, computational intelligence techniques like neural networks, evolutionary computation, swarm intelligence, and fuzzy systems are gaining popularity in solving intractable problems in various disciplines including sensor networks. The contributions combine the best attributes of these two distinct fields, offering readers a comprehensive overview of the emerging research areas and presenting first-hand experience of a variety of computational intelligence approaches in sensor networks.

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1924
Release: 2020-09-30
Genre: Computers
ISBN: 1799853527

Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Security and Privacy in Wireless and Mobile Networks

Security and Privacy in Wireless and Mobile Networks
Author: Georgios Kambourakis
Publisher: MDPI
Total Pages: 173
Release: 2018-04-13
Genre: Technology & Engineering
ISBN: 3038427799

This book is a printed edition of the Special Issue "Security and Privacy in Wireless and Mobile Networks" that was published in Future Internet