Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Introduction to Wireless Sensor Networks
History of WSN
Homogenous Sensor Networks
Heterogeneous Sensor Networks
Architecture of Sensor Nodes
The Protocol Stack in WSN
MANET versus WSN
Similarities between MANET and WSN
Differences between MANET and WSN
Challenges in WSN
Battery Life and Power Consumption
Power Conservation Mechanism
Integrated Circuit (IC) Technology
The Routing Problem in WSN
Broadcasting and Multicasting
Data Aggregation in WSN
Security in Wireless Sensor Networks
Elliptic Curve Cryptography
Identity-Based Authentication and Encryption in Wireless Sensor Networks
Identity-Based Key Distribution in Wireless Sensor Networks
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
Cross-Layer Security in Wireless Sensor Networks
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
Each chapter includes a Summary and References
Appendix—For Further Reading
" … an excellent starting point for practitioners in the industry and students in academia faced with security issues in WSNs. It provides a comprehensive and systematic introduction to the fundamental concepts, major issues, and effective security solutions in wireless sensor networking."
—IEEE Communications Magazine, October 2013
"Getting the right balance of systems security is a hard enough task in traditional networking, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks."
—Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent; Adjunct Professor, Department of Computer Science, Illinois Institute of Technology
"Strong identity mechanisms are a hard sell for today’s Net because people feel that they know who they’re talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace 'feeling secure' with actually being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses."
—Dean Willis, Chair, IETF SIP Working Group, 1999-2009
"… a valuable reference on IBC theory and practice that researchers and practitioners will want on their bookshelves for many years. In addition, it will certainly stimulate new directions in research in wireless network security."
—Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009–2011
|K13162.zip||Cross Platform||June 13, 2013||Errata||Page 99 & 105 References|