Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks
Identiry Based Cryptography;imote2;sensor networks;Tate pairing
Kampanakis, Panagiotis T. ; Michael Devetsikiotis, Committee Chair,Peng Ning, Committee Co-Chair,Mihail Sichitiu, Committee Member,Kampanakis, Panagiotis T. ; Michael Devetsikiotis ; Committee Chair ; Peng Ning ; Committee Co-Chair ; Mihail Sichitiu ; Committee Member
Elliptic Curve Cryptography (ECC) has been a very interesting research field for many applications, especially in sensor networks. The main reason for this is the restrictions on resources posed by sensor motes. ECC alleviates these restrictions by using small prime fields. At the same time, the evolution of hardware technology has built new, sophisticated motes with more capabilities which open new ways for sensor network applications.In our work, we are extending the TinyECC package, initially written by An Liu, which provides elliptic curve cryptography functionality on sensor motes running TinyOS. We extend this package by porting it to new powerful motes, called Imote2s by Intel. We also further implement Bilinear Pairing which is the most important part of Identity-Based Cryptography. Furthermore, we evaluate and prove the feasibility of using pairing on next generation sensor motes. There are various ways that Bilinear Pairing could be used in Identity-Based cryptosystems, so in this way we insert Identity-Based Cryptography in the area of security for sensor networks. Additionally, we propose a scheme that can establish keys on sensor networks using Identity-Based Cryptography. We believe that our study will open the way and motivate further research in the field and contribute in providing more robust and secure sensor networks.
【 预 览 】
附件列表
Files
Size
Format
View
Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks