Contents

Dedication

Foreword

Preface

Acknowledgments

About the Authors

Chapter 1 Introduction to Wireless Sensor Networks

In This Chapter

1.1    Introduction

1.1.1    WSN Applications

1.2    History of WSN

1.3    WSN Architecture

1.3.1    Homogenous Sensor Networks

1.3.2    Heterogeneous Sensor Networks

1.4    Architecture of Sensor Nodes

1.5    The Protocol Stack in WSN

1.6    MANET Versus WSN

1.6.1    Similarities Between MANET and WSN

1.6.2    Differences Between MANET and WSN

1.7    Challenges in WSN

1.7.1    Battery Life and Power Consumption

1.7.2    Power Conservation Mechanism

1.7.3    Communication Media

1.7.4    Integrated Circuit (IC) Technology

1.8    The Routing Problem in WSN

1.9    Broadcasting and Multicasting

1.9.1    Broadcasting

1.9.2    Network Discovery

1.9.3    Data Aggregation in WSN

1.10  Summary

1.11  References

Chapter 2 Security in Wireless Sensor Networks

In This Chapter

2.1    Introduction

2.2    Attacks on WSN

2.2.1    Threats to Privacy

2.2.2    Threats to Control

2.2.3    Threats to Availability

2.2.4    Attacks Specific to WSN

2.3    Countermeasures to Attacks in WSN

2.3.1    Security in WSN Using a Layered Approach

2.4    Summary

2.5    References

Chapter 3 Elliptic Curve Cryptography

In This Chapter

3.1    Introduction

3.2    Introduction to Modern Algebra

3.2.1    Groups

3.2.2    Rings

3.2.3    Fields

3.3    Prime Fields

3.4    Binary Fields

3.5    Elliptic Curve Cryptography

3.5.1    Discrete log Problem

3.5.2    Weierstrass Equations

3.5.3    Prime Curves

3.5.4    Binary Curves

3.5.5    Group Law

3.6    Why Elliptic Curve Cryptography?

3.7    Elliptic Curve Discrete Log Problem

3.8    Torsion Points

3.9    Pairing-Based Cryptography

3.9.1    Divisor Theory

3.9.2    Rational Function

3.9.3    Weil Pairing

3.9.4    Bilinear Property

3.9.5    Tate Pairing

3.10  Summary

3.11  References

Chapter 4 Identity-Based Cryptography

In This Chapter

4.1    Introduction

4.1.1    Symmetric Key Cryptographic Systems

4.1.2    Asymmetric Key Cryptographic Systems

4.2    Public Key Infrastructure

4.2.1    Single-Certificate Authority Model

4.2.2    A Hierarchy of Certificate Authorities

4.2.3    Pros and Cons of PKI

4.3    Identity-Based Cryptography

4.3.1    Computational Problems

4.3.2    Identity-Based Encryption Schemes

4.3.3    Hierarchical Identity-Based Encryption Scheme

4.3.4    Identity-Based Authentication Schemes

4.3.5    Key Distribution in IBC

4.3.6    Key Escrow Problem

4.3.7    Threshold Signature Scheme

4.4    Summary

4.5    References

Chapter 5 Identity-Based Authentication and Encryption in Wireless Sensor Networks

In This Chapter

5.1    Introduction

5.2    Related Work

5.2.1    SPINS

5.2.2    TinySec

5.2.3    Lightweight Public Key Infrastructure for WSN

5.3    Identity-Based Digital Signature Schemes in WSN

5.3.1    ID-Based Signature (IBS)

5.3.2    ID-Based Online/Offline Signature (IBOOS)

5.3.3    BNN-IBS Scheme

5.3.4    Description of Identity-Based Multiuser Broadcast Authentication in Wireless Sensor Networks (IMBAS)

5.3.5    ID-Based One-Pass Authenticated Key-Establishment Protocol for WSN

5.3.6    TinyIBE Scheme

5.4    Revocation

5.5    User Authentication

5.6    Summary

5.7    References

Chapter 6 Identity-Based Key Distribution in Wireless Sensor Networks

In This Chapter

6.1    Introduction

6.2    Background

6.3    Key-Distribution Schemes

6.3.1    Symmetric Key Algorithms

6.3.2    Trusted Server Mechanisms

6.3.3 λ-Secure n × n Key-Establishment Schemes

6.3.4    Random Key-Predistribution Schemes

6.3.5 q-Composite Scheme

6.3.6    Random Pairwise Key Scheme

6.3.7    Multispace Key Schemes

6.3.8    Deterministic Key-Predistribution Schemes

6.3.9    Public Key Algorithms

6.4    ID-Based Key-Distribution Schemes

6.4.1    ID-Based Bilinear Key-Predistribution Scheme for Distributed Sensor Networks

6.4.2    Key Maintenance

6.5    Cross-Layer Approach to Key Management

6.6    Summary

6.7    References

Chapter 7 Routing in Wireless Sensor Networks Using Identity-Based Cryptography

In This Chapter

7.1    Introduction

7.2    Routing Classifications in WSN

7.2.1    Data-Centric Communication

7.2.2    Location Information

7.2.3    Network Layering and In-Network Processing

7.2.4    Path Redundancy

7.2.5    Quality of Service (QoS)

7.2.6    Network Dynamics

7.2.7    Network Heterogeneity

7.3    Related Work

7.3.1    Routing Protocols in WSN

7.4    Selective-Forwarding Attack in WSN

7.4.1    ID-Based Routing in WSN

7.4.2    Cross-Layer Routing

7.5    Summary

7.6    References

Chapter 8 Cross-Layer Security in Wireless Sensor Networks

In This Chapter

8.1    Introduction

8.2    Cross-Layer Design in WSN

8.2.1    Motivation

8.3    Cross-Layer Design Proposals

8.4    Cross-Layer Key Distribution

8.4.1    Clustering Protocol

8.5    Cross-Layer Key Establishment

8.5.1    Basic Scheme

8.5.2    Pairwise Key Setup with ECDH

8.6    Open Challenges

8.6.1    Cross-Layer Couplings

8.6.2    Coexistence of Cross-Layer Design Proposals

8.6.3    Particular Cross-Layer Design

8.6.4    Standardization of Interfaces

8.6.5    Physical Layer in Cross-Layer Proposals

8.6.6    Ideal Model for Secure Communication

8.7    Summary

8.8    References

Chapter 9 Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks

In This Chapter

9.1    Introduction

9.2    Point Coordinate System

9.3    Design Principles

9.4    ECC Security Parameters

9.5    The Platform

9.5.1    MICAz/MICA2 Mote

9.5.2    16-bit MSP430 Microcontroller

9.5.3    Marvell PXA271

9.6    Related Work

9.6.1    TinyECC

9.6.2    NanoECC

9.7    Implementation of Identity-Based Cryptography (IBC) in WSN

9.8    Algorithms for Finite Field Arithmetic

9.8.1    Prime Field Arithmetic on Resource-Constraint Processors

9.8.2    Efficient Binary Field Arithmetic for Low-End Processors

9.9    Summary

9.10  References

Appendix—For Further Reading

Index