NCSU Institutional Repository >
NC State Theses and Dissertations >
Please use this identifier to cite or link to this item:
|Title: ||Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks|
|Authors: ||Kampanakis, Panagiotis T.|
|Advisors: ||Michael Devetsikiotis, Committee Chair|
Peng Ning, Committee Co-Chair
Mihail Sichitiu, Committee Member
|Keywords: ||Identiry Based Cryptography|
|Issue Date: ||11-Nov-2007|
|Discipline: ||Computer Engineering|
|Abstract: ||Elliptic Curve Cryptography (ECC) has been a very interesting research field for many applications, especially in sensor networks. The main reason for this is the restrictions on resources posed by sensor motes. ECC alleviates these restrictions by using small prime fields. At the same time, the evolution of hardware technology has built new, sophisticated motes with more capabilities which open new ways for sensor network applications.
In our work, we are extending the TinyECC package, initially written by An Liu, which provides elliptic curve cryptography functionality on sensor motes running TinyOS. We extend this package by porting it to new powerful motes, called Imote2s by Intel. We also further implement Bilinear Pairing which is the most important part of Identity-Based Cryptography. Furthermore, we evaluate and prove the feasibility of using pairing on next generation sensor motes. There are various ways that Bilinear Pairing could be used in Identity-Based cryptosystems, so in this way we insert Identity-Based Cryptography in the area of security for sensor networks. Additionally, we propose a scheme that can establish keys on sensor networks using Identity-Based Cryptography. We believe that our study will open the way and motivate further research in the field and contribute in providing more robust and secure sensor networks.|
|Appears in Collections:||Theses|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.