1st Edition

Security for Wireless Sensor Networks using Identity-Based Cryptography

    232 Pages 57 B/W Illustrations
    by Auerbach Publications

    232 Pages 57 B/W Illustrations
    by Auerbach Publications

    Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

    After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.

    Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

    Introduction to Wireless Sensor Networks
    Introduction 
         WSN Applications 
    History of WSN
    WSN Architecture 
         Homogenous Sensor Networks 
         Heterogeneous Sensor Networks
    Architecture of Sensor Nodes
    The Protocol Stack in WSN
    MANET versus WSN 
         Similarities between MANET and WSN 
         Differences between MANET and WSN
    Challenges in WSN 
         Battery Life and Power Consumption
         Power Conservation Mechanism
         Communication Media 
         Integrated Circuit (IC) Technology
    The Routing Problem in WSN
    Broadcasting and Multicasting 
         Broadcasting 
         Network Discovery 
         Data Aggregation in WSN

    Security in Wireless Sensor Networks
    Introduction
    Attacks on WSN
         Threats to Privacy 
         Threats to Control 
         Threats to Availability 
         Attacks Specific to WSN
    Countermeasures to Attacks in WSN
         Security in WSN Using a Layered Approach

    Elliptic Curve Cryptography
    Introduction
    Introduction to Modern Algebra 
         Groups 
         Rings 
         Fields
    Prime Fields
    Binary Fields
    Elliptic Curve Cryptography 
         Discrete log Problem
         Weierstrass Equations
         Prime Curves 
         Binary Curves 
         Group Law
    Why Elliptic Curve Cryptography?
    Elliptic Curve Discrete Log Problem
    Torsion Points
    Pairing-Based Cryptography
         Divisor Theory 
         Rational Function 
         Weil Pairing 
         Bilinear Property 
         Tate Pairing

    Identity-Based Cryptography
    Introduction 
         Symmetric Key Cryptographic Systems 
         Asymmetric Key Cryptographic Systems
    Public Key Infrastructure 
         Single-Certificate Authority Model 
         A Hierarchy of Certificate Authorities
         Pros and Cons of PKI
    Identity-Based Cryptography 
         Computational Problems
         Identity-Based Encryption Schemes 
         Hierarchical Identity-Based Encryption Scheme 
         Identity-Based Authentication Schemes 
         Key Distribution in IBC 
         Key Escrow Problem 
         Threshold Signature Scheme

    Identity-Based Authentication and Encryption in Wireless Sensor Networks
    Introduction
    Related Work
         SPINS
         TinySec 
         Lightweight Public Key Infrastructure for WSN
    Identity-Based Digital Signature Schemes in WSN 
         ID-Based Signature (IBS) 
         ID-Based Online/Offline Signature (IBOOS) 
         BNN-IBS Scheme 
         Description of Identity-Based Multiuser Broadcast Authentication in Wireless Sensor Networks (IMBAS) 
         ID-Based One-Pass Authenticated Key-Establishment Protocol for WSN 
         TinyIBE Scheme
    Revocation
    User Authentication

    Identity-Based Key Distribution in Wireless Sensor Networks
    Introduction
    Background
    Key-Distribution Schemes 
         Symmetric Key Algorithms 
         Trusted Server Mechanisms 
         Secure n x n Key-Establishment Schemes 
         Random Key-Predistribution Schemes 
         q-Composite Scheme 
         Random Pairwise Key Scheme 
          Multispace Key Schemes
         Deterministic Key-Predistribution Schemes 
         Public Key Algorithms
    ID-Based Key-Distribution Schemes
         ID-Based Bilinear Key-Predistribution Scheme for Distributed Sensor Networks 
         Key Maintenance
    Cross-Layer Approach to Key Management

    Routing in Wireless Sensor Networks Using Identity-Based Cryptography
    Introduction
    Routing Classifications in WSN 
         Data-Centric Communication 
         Location Information
         Network Layering and In-Network Processing 
         Path Redundancy
         Quality of Service (QoS) 
         Network Dynamics 
         Network Heterogeneity
    Related Work 
         Routing Protocols in WSN
    Selective-Forwarding Attack in WSN
         ID-Based Routing in WSN 
         Cross-Layer Routing

    Cross-Layer Security in Wireless Sensor Networks
    Introduction
    Cross-Layer Design in WSN 
         Motivation
    Cross-Layer Design Proposals
    Cross-Layer Key Distribution 
         Clustering Protocol
    Cross-Layer Key Establishment 
         Basic Scheme
         Pairwise Key Setup with ECDH
    Open Challenges 
         Cross-Layer Couplings 
         Coexistence of Cross-Layer Design Proposals 
         Particular Cross-Layer Design 
         Standardization of Interfaces 
         Physical Layer in Cross-Layer Proposals
         Ideal Model for Secure Communication

    Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
    Introduction
    Point Coordinate System
    Design Principles
    ECC Security Parameters
    The Platform 
         MICAz/MICA2 Mote
         16-bit MSP430 Microcontroller 
         Marvell PXA271
    Related Work 
         TinyECC
         NanoECC
    Implementation of Identity-Based Cryptography (IBC) in WSN
    Algorithms for Finite Field Arithmetic 
         Prime Field Arithmetic on Resource-Constraint Processors
         Efficient Binary Field Arithmetic for Low-End Processors

    Each chapter includes a Summary and References

    Appendix—For Further Reading

    Biography

    Harsh Kupwade Patil:

    Dr. Harsh Kupwade Patil is a Technical Advisor in the Dallas office of Fish & Richardson P.C. His practice supports patent prosecution in a broad range of technologies, particularly in network and system security and applied cryptography. Prior to joining the firm, Dr. Kupwade Patil was involved in collaborative research work with Cisco Systems Inc., Bell Laboratories–Alcatel-Lucent, and Sipera Systems Inc. (acquired by Avaya Inc.). He holds a Master’s Degree in Electrical Engineering and a Ph.D. in Applied Science from Southern Methodist University.

    Stephen A. Szygenda:

    Professor Szygenda is the former Dean of the School of Engineering at Southern Methodist University and The University of Alabama–Birmingham. He has held the position of Chairman of the Electrical and Computer Engineering Department at The University of Texas–Austin, where he also held the Clint Murchison Jr. Chair of Free Enterprise and was the founding Director of the Texas Center for Technology Development and Transfer. During his academic endeavors, Dr. Szygenda acquired extensive government and industry research funding, received numerous awards, consulted for more than 50 international companies and universities, served on the board of directors of a number of companies, and published more than 200 papers. He received his Ph.D. from Northwestern University.

    In industry, Dr. Szygenda has served as President of SBI Inc., COMSAT General Integrated Systems, the Rubicon Group, and Comprehensive Computing Systems and Services Inc. He was also a member of the technical staff at Bell Telephone Laboratories. Dr. Szygenda is a pioneer in the areas of Simulation, CAD, Fault Tolerant Computing, Telecommunications, Software Engineering, Entrepreneurship, Strategic Planning, Technology Transfer, Business Management, and Economic Development.

    " … an excellent starting point for practitioners in the industry and students in academia faced with security issues in WSNs. It provides a comprehensive and systematic introduction to the fundamental concepts, major issues, and effective security solutions in wireless sensor networking."
    IEEE Communications Magazine, October 2013

    "Getting the right balance of systems security is a hard enough task in traditional networking, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks."
    Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent; Adjunct Professor, Department of Computer Science, Illinois Institute of Technology 

    "Strong identity mechanisms are a hard sell for today’s Net because people feel that they know who they’re talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace 'feeling secure' with actually being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses."
    —Dean Willis, Chair, IETF SIP Working Group, 1999-2009

    "… a valuable reference on IBC theory and practice that researchers and practitioners will want on their bookshelves for many years. In addition, it will certainly stimulate new directions in research in wireless network security."
    —Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009–2011