Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks

Show full item record

Title: Identity-Based Cryptography: Feasibility & Applications in Next Generation Sensor Networks
Author: Kampanakis, Panagiotis T.
Advisors: Michael Devetsikiotis, Committee Chair
Peng Ning, Committee Co-Chair
Mihail Sichitiu, Committee Member
Abstract: Elliptic Curve Cryptography (ECC) has been a very interesting research field for many applications, especially in sensor networks. The main reason for this is the restrictions on resources posed by sensor motes. ECC alleviates these restrictions by using small prime fields. At the same time, the evolution of hardware technology has built new, sophisticated motes with more capabilities which open new ways for sensor network applications. In our work, we are extending the TinyECC package, initially written by An Liu, which provides elliptic curve cryptography functionality on sensor motes running TinyOS. We extend this package by porting it to new powerful motes, called Imote2s by Intel. We also further implement Bilinear Pairing which is the most important part of Identity-Based Cryptography. Furthermore, we evaluate and prove the feasibility of using pairing on next generation sensor motes. There are various ways that Bilinear Pairing could be used in Identity-Based cryptosystems, so in this way we insert Identity-Based Cryptography in the area of security for sensor networks. Additionally, we propose a scheme that can establish keys on sensor networks using Identity-Based Cryptography. We believe that our study will open the way and motivate further research in the field and contribute in providing more robust and secure sensor networks.
Date: 2007-11-11
Degree: MS
Discipline: Computer Engineering
URI: http://www.lib.ncsu.edu/resolver/1840.16/2314


Files in this item

Files Size Format View
etd.pdf 575.3Kb PDF View/Open

This item appears in the following Collection(s)

Show full item record