Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Unbelievable Security. Matching AES Security Using Public Key Systems
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Health monitoring of civil infrastructures using wireless sensor networks
Proceedings of the 6th international conference on Information processing in sensor networks
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Identity-Based Encryption for Sensor Networks
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Hi-index | 0.01 |
Key distribution is a challenging problem in Wireless Sensor Networks (WSNs). The system has to be simple, energy efficient and at the same time offer a high level of security. This paper shows that all these requirements can be addressed by using an Identity-Based Cryptography (IBC) approach. We explain why IBC is a better security solution than methods based on standard public key and symmetric key mechanisms. We also suggest a practical identity-based key agreement scheme that does not require any communication between two parties. This scheme simplifies the key management in the network by reducing the number of required keys, making the system scalable. Evaluation results prove that the software implementation is practical on a broad range of sensor platforms and different CPU architectures. Comparison with the state of the art shows that identity-based key distribution is a superior security solution for WSNs with better resistance against known attacks.