Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks

The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Leendert van Doorn,et al.  A Practical Guide to Trusted Computing , 2007 .

[3]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[4]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[5]  Yusnani Mohd Yussoff,et al.  Trusted Wireless Sensor Node Platform , 2010, WCE 2010.

[6]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[7]  Johann Großschädl,et al.  Reassessing the TCG specifications for trusted computing in mobile and embedded systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  H. Hashim,et al.  Secure boot process for wireless sensor node , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[10]  Guido Appenzeller,et al.  Identity-Based Encryption Architecture and Supporting Data Structures , 2009, RFC.

[11]  Piotr Szczechowiak,et al.  TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[12]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.