IBE-Trust: A security framework for Wireless Sensor Networks

The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework incorporates ideas from Trusted Computing Group (TCG) and the Identity-based cryptosystem developed by Boneh Franklin in ensuring trusted and secure communications between sender and receiver. The framework and proposed implementation procedures are briefly discussed. The proposed framework which was developed on TinyOS platform was simulated using TOSSIM on Micaz nodes and a study was carried out to compare memory utilizations of the proposed security framework with those obtained in a recent similar work.

[1]  John W. Rittinghouse,et al.  Wireless Security: Know It All , 2008 .

[2]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[3]  David Pollino,et al.  Wireless security , 2002 .

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[6]  Michael Scott,et al.  On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.

[7]  David Grawrock Dynamics of a trusted platform: a building block approach , 2009 .

[8]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[9]  Xiaotie Deng,et al.  TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[10]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[11]  Guido Appenzeller,et al.  Identity-Based Encryption Architecture and Supporting Data Structures , 2009, RFC.

[12]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[13]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[14]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[15]  Yusnani Mohd Yussoff,et al.  Trusted Wireless Sensor Node Platform , 2010, WCE 2010.

[16]  Choong Seon Hong,et al.  Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.

[17]  S. Shankar Sastry,et al.  Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .

[18]  Zhi Guan,et al.  Efficient Identity-Based Key Issue with TPM , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[19]  Ricardo Dahab,et al.  TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[20]  Chunming Rong,et al.  Identity-based key agreement and encryption for wireless sensor networks , 2006 .