Chapter 1 Introduction to Wireless Sensor Networks
1.3.1 Homogenous Sensor Networks
1.3.2 Heterogeneous Sensor Networks
1.4 Architecture of Sensor Nodes
1.6.1 Similarities Between MANET and WSN
1.6.2 Differences Between MANET and WSN
1.7.1 Battery Life and Power Consumption
1.7.2 Power Conservation Mechanism
1.7.4 Integrated Circuit (IC) Technology
1.8 The Routing Problem in WSN
1.9 Broadcasting and Multicasting
Chapter 2 Security in Wireless Sensor Networks
2.3 Countermeasures to Attacks in WSN
2.3.1 Security in WSN Using a Layered Approach
Chapter 3 Elliptic Curve Cryptography
3.2 Introduction to Modern Algebra
3.5 Elliptic Curve Cryptography
3.6 Why Elliptic Curve Cryptography?
3.7 Elliptic Curve Discrete Log Problem
3.9 Pairing-Based Cryptography
Chapter 4 Identity-Based Cryptography
4.1.1 Symmetric Key Cryptographic Systems
4.1.2 Asymmetric Key Cryptographic Systems
4.2.1 Single-Certificate Authority Model
4.2.2 A Hierarchy of Certificate Authorities
4.3 Identity-Based Cryptography
4.3.2 Identity-Based Encryption Schemes
4.3.3 Hierarchical Identity-Based Encryption Scheme
4.3.4 Identity-Based Authentication Schemes
4.3.7 Threshold Signature Scheme
Chapter 5 Identity-Based Authentication and Encryption in Wireless Sensor Networks
5.2.3 Lightweight Public Key Infrastructure for WSN
5.3 Identity-Based Digital Signature Schemes in WSN
5.3.1 ID-Based Signature (IBS)
5.3.2 ID-Based Online/Offline Signature (IBOOS)
5.3.5 ID-Based One-Pass Authenticated Key-Establishment Protocol for WSN
Chapter 6 Identity-Based Key Distribution in Wireless Sensor Networks
6.3.1 Symmetric Key Algorithms
6.3.2 Trusted Server Mechanisms
6.3.3 λ-Secure n × n Key-Establishment Schemes
6.3.4 Random Key-Predistribution Schemes
6.3.6 Random Pairwise Key Scheme
6.3.8 Deterministic Key-Predistribution Schemes
6.4 ID-Based Key-Distribution Schemes
6.4.1 ID-Based Bilinear Key-Predistribution Scheme for Distributed Sensor Networks
6.5 Cross-Layer Approach to Key Management
Chapter 7 Routing in Wireless Sensor Networks Using Identity-Based Cryptography
7.2 Routing Classifications in WSN
7.2.1 Data-Centric Communication
7.2.3 Network Layering and In-Network Processing
7.2.5 Quality of Service (QoS)
7.3.1 Routing Protocols in WSN
7.4 Selective-Forwarding Attack in WSN
Chapter 8 Cross-Layer Security in Wireless Sensor Networks
8.3 Cross-Layer Design Proposals
8.4 Cross-Layer Key Distribution
8.5 Cross-Layer Key Establishment
8.5.2 Pairwise Key Setup with ECDH
8.6.2 Coexistence of Cross-Layer Design Proposals
8.6.3 Particular Cross-Layer Design
8.6.4 Standardization of Interfaces
8.6.5 Physical Layer in Cross-Layer Proposals
8.6.6 Ideal Model for Secure Communication
Chapter 9 Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
9.5.2 16-bit MSP430 Microcontroller
9.7 Implementation of Identity-Based Cryptography (IBC) in WSN
9.8 Algorithms for Finite Field Arithmetic
9.8.1 Prime Field Arithmetic on Resource-Constraint Processors
9.8.2 Efficient Binary Field Arithmetic for Low-End Processors