Article details

Title: A Hybrid Hierarchical Identity Based Cryptography Scheme in a Wireless Sensor Network
Author(s): Bogdan-Cosmin Chifor               

Abstract: Wireless sensor networks is a topic increasingly important in the context of the growing concept of Internet of things (IOT) and lately the Internet of Everything (IOE). Wireless sensor networks can be found in many aspects of our lives, among which: the environmental monitoring (air, water, soil, etc.), the asset tracking, the industrial machine monitoring, the process monitoring, the structural monitoring for buildings and bridges. Because sensors can be employed in critical areas of our lives, the data transmitted in the WSN must be protected against eavesdroppers and must be authenticated. Achieving this goal is not an easy task due to the computational and energy constraints of the WSN. Because of this, a classic PKI architecture can not be utilized in such a scenario. In this paper is presented an alternative security solution which uses identity based cryptography. This solution in contrast to a classic PKI architecture requires no public key distribution and uses a lightweight format of digital certificates. The wireless sensor network is divided into several areas, each area being subordinate to a certificate authority called the PKG (Private Key Generator), which generates the private keys for the nodes. By using the node’s identity and the private keys generated by the PKG, the data is aggregated, encrypted and routed until it reaches the base station (the network gateway).

Keywords: PKI, WSN, digital certificates, PBC, TinyOS.

References:

[1] H.K. PATIL, S.A. SZYGENDA – Security for Wireless Sensor Networks using Identity-Based Cryptography, CRC Press - Taylor & Francis Group, London, UK, Oct., 2012
[2] P. LEVIS, N. LEE, M. WELSH, D. CULLER – TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications, Proc. of the 1st International Conference on Embedded Networked Sensor Systems, ACM, pp. 126-137, New York, NY, 2003
[3] E. PERLA, A.Ó. CATHÁIN, R.S. CARBAJO, M. HUGGARD, C. Mc GOLDRICK – PowerTOSSIM z: Realistic Energy Modelling for Wireless Sensor Network Environments, Proc. of the 3rd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, ACM, pp. 35-42, New York, NY, Oct. 31, 2008
[4] W. DARGIE, C. POELLABAUER – Fundamentals of Wireless Sensor Networks: Theory and Practice, Wiley, 2010
[5] P. LEVIS, D. GAY – TinyOS Programming, Cambridge University Press, 2009
[6] D. GAY, P. LEVIS, R.V. BEHREN, M. WELSH, E. BREWER, D. CULLER – The nesC Language: A Holistic Approach to Networked Embedded Systems, Proc. of the SIGPLAN Conference on Programming Language Design and Implementation (PLDI), San Diego, CA, Jun. 9-11, 2003
[7] L.B. OLIVEIRA, R. DAHAB, J. LOPEZ, F. DAGUANO, ANTONIO A.F. LOUREIRO – Identity-Based Encryption for Sensor Networks, Proc. of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, PerComW’07, pp. 290-294, Washington, DC, 2007
[8] D. BONEH, M.K. FRANKLIN – Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, Vol. 32, No. 3, pp. 586-615, 2013
[9] X. XIONG, D.S. WONG, X. DENG – TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks, Proc. of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Sydney, Australia, Apr. 18-21, 2010
[10] D. BONEH, B. LYNN, H. SHACHAM – Short Signatures from the Weil Pairing, J. Cryptology, Vol. 17, No. 4, pp. 297-319, Sep. 2004