Article details

Title: A Hybrid Hierarchical Identity Based Cryptography Scheme in a Wireless Sensor Network
Author(s): Bogdan-Cosmin Chifor               

Abstract: Wireless sensor networks is a topic increasingly important in the context of the growing concept of Internet of things (IOT) and lately the Internet of Everything (IOE). Wireless sensor networks can be found in many aspects of our lives, among which: the environmental monitoring (air, water, soil, etc.), the asset tracking, the industrial machine monitoring, the process monitoring, the structural monitoring for buildings and bridges. Because sensors can be employed in critical areas of our lives, the data transmitted in the WSN must be protected against eavesdroppers and must be authenticated. Achieving this goal is not an easy task due to the computational and energy constraints of the WSN. Because of this, a classic PKI architecture can not be utilized in such a scenario. In this paper is presented an alternative security solution which uses identity based cryptography. This solution in contrast to a classic PKI architecture requires no public key distribution and uses a lightweight format of digital certificates. The wireless sensor network is divided into several areas, each area being subordinate to a certificate authority called the PKG (Private Key Generator), which generates the private keys for the nodes. By using the nodes identity and the private keys generated by the PKG, the data is aggregated, encrypted and routed until it reaches the base station (the network gateway).

Keywords: PKI, WSN, digital certificates, PBC, TinyOS.


[1] H.K. PATIL, S.A. SZYGENDA Security for Wireless Sensor Networks using Identity-Based Cryptography, CRC Press - Taylor & Francis Group, London, UK, Oct., 2012
[2] P. LEVIS, N. LEE, M. WELSH, D. CULLER TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications, Proc. of the 1st International Conference on Embedded Networked Sensor Systems, ACM, pp. 126-137, New York, NY, 2003
[3] E. PERLA, A.. CATHIN, R.S. CARBAJO, M. HUGGARD, C. Mc GOLDRICK PowerTOSSIM z: Realistic Energy Modelling for Wireless Sensor Network Environments, Proc. of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, ACM, pp. 35-42, New York, NY, Oct. 31, 2008
[4] W. DARGIE, C. POELLABAUER Fundamentals of Wireless Sensor Networks: Theory and Practice, Wiley, 2010
[5] P. LEVIS, D. GAY TinyOS Programming, Cambridge University Press, 2009
[6] D. GAY, P. LEVIS, R.V. BEHREN, M. WELSH, E. BREWER, D. CULLER The nesC Language: A Holistic Approach to Networked Embedded Systems, Proc. of the SIGPLAN Conference on Programming Language Design and Implementation (PLDI), San Diego, CA, Jun. 9-11, 2003
[7] L.B. OLIVEIRA, R. DAHAB, J. LOPEZ, F. DAGUANO, ANTONIO A.F. LOUREIRO Identity-Based Encryption for Sensor Networks, Proc. of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, PerComW07, pp. 290-294, Washington, DC, 2007
[8] D. BONEH, M.K. FRANKLIN Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, Vol. 32, No. 3, pp. 586-615, 2013
[9] X. XIONG, D.S. WONG, X. DENG TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks, Proc. of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Sydney, Australia, Apr. 18-21, 2010
[10] D. BONEH, B. LYNN, H. SHACHAM Short Signatures from the Weil Pairing, J. Cryptology, Vol. 17, No. 4, pp. 297-319, Sep. 2004