Browse DORAS
Browse Theses
Search
Latest Additions
Creative Commons License
Except where otherwise noted, content on this site is licensed for use under a:

TinyIBE: identity-based encryption for heterogeneous sensor networks

Szczechowiak, Piotr and Collier, Martin (2009) TinyIBE: identity-based encryption for heterogeneous sensor networks. In: ISSNIP 2009 - International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 7-10 December 2009 , Melbourne, Australia. ISBN 978-1-4244-3517-3

Full text available as:

[img]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
789Kb

Abstract

The area of security for heterogeneous sensor networks (HSNs) is still an open research field that requires new cryptographic solutions. Recent results have demonstrated that elliptic curve cryptography (ECC) and pairing-based cryptography (PBC) are computationally feasible on sensor devices. This allows a wide range of novel security mechanisms, like identity-based encryption (IBE), to be considered for wireless sensor networks (WSNs). In this paper we present an efficient security bootstrapping mechanism for HSNs that uses IBE and exploits the enhanced capabilities of high-end cluster heads. Our asymmetric security scheme provides authenticated key distribution without using expensive certificates. It also achieves significant savings in communication overhead and in the number of keys stored on sensor devices. We also present TinyIBE, which is to our knowledge, the first implementation of a complete identity-based encryption scheme for sensor networks. Our evaluation results and comparison with the state of the art show that TinyIBE is a superior security scheme for HSNs which provides affordable public key cryptography without requiring hardware acceleration. With this work we prove that ID-based encryption is not only possible on sensor nodes but is an attractive security solution in this application space.

Item Type:Conference or Workshop Item (Paper)
Event Type:Conference
Refereed:Yes
Uncontrolled Keywords:computer bootstrapping; message authentication; public key cryptography; wireless sensor networks;
Subjects:Engineering > Telecommunication
DCU Faculties and Centres:DCU Faculties and Schools > Faculty of Engineering and Computing > School of Electronic Engineering
Published in:Proceedings of the 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing. . Institute of Electrical and Electronics Engineers. ISBN 978-1-4244-3517-3
Publisher:Institute of Electrical and Electronics Engineers
Official URL:http://dx.doi.org/10.1109/ISSNIP.2009.5416743
Copyright Information:©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
ID Code:15504
Deposited On:19 Jul 2010 12:22 by DORAS Administrator. Last Modified 19 Jul 2010 12:22

Download statistics

Archive Staff Only: edit this record