Low energy identity-based trusted access control scheme for Wireless Sensor Network

In this paper, a framework of a trusted identity-based authentication scheme named as IBE-Trust is presented. IBE-Trust is an authentication scheme for new nodes to join the networks with the objective to confirm the trustworthiness of the nodes. IBE-Trust provides basic primitives of security by providing confidentiality, message integrity and authentication between new node and base station. The proposed scheme incorporates ideas from Trusted Computing Group (TCG) and Identity-based cryptosystem developed by Boneh Franklin. Analysis on the energy utilization of the proposed trusted authentication protocol running on the ARM11 processor is also presented at the end of the paper. We conclude that the energy utilization needed to establish trust on such a platform is a worthwhile trade-off.

[1]  Rolf Oppliger SSL and TLS: Theory and Practice , 2009 .

[2]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[3]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[4]  Johann Großschädl,et al.  Reassessing the TCG specifications for trusted computing in mobile and embedded systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[5]  S. Shankar Sastry,et al.  Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .

[6]  Srivaths Ravi,et al.  Energy and execution time analysis of a software-based trusted platform module , 2007 .

[7]  Yusnani Mohd Yussoff,et al.  Trusted Wireless Sensor Node Platform , 2010, WCE 2010.

[8]  W. Marsden I and J , 2012 .

[9]  Luther Martin,et al.  Introduction to Identity-Based Encryption , 2008 .

[10]  Colin Boyd,et al.  ID-based One-pass Authenticated Key Establishment , 2008, AISC.

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Leendert van Doorn,et al.  A Practical Guide to Trusted Computing , 2007 .

[13]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[14]  Srivaths Ravi,et al.  Energy and Execution Time Analysis of a Software-based Trusted Platform Module , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[15]  Piotr Szczechowiak,et al.  Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[16]  Vipul Goyal,et al.  Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.

[17]  YangYang,et al.  Wireless sensor and actuator networks , 2010 .

[18]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[19]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[20]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[21]  Pavan Sikka,et al.  Wireless Sensor and Actuator Networks : 2-year progress report July 2004 to June 2006 , 2006 .