资源描述:
《Security for Wireless Sensor Networks using Identity-Based Cryptography, 2013》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、ComputerScience&Engineering/Cryptography&CodingTheorySzygendaPatil…anexcellentstartingpointforpractitionersintheindustryandstudentsinacademiaSecurityforWirelesstocomeuptospeedwithsecurityissuesinwirelesssensornetworks.—VijayK.Gurbani,Ph.D.,DistinguishedMemberofTechnicalStaff,BellLaboratories,Alca
2、tel-LucentSensorNetworksWirelesssensorsaretheeyes,ears,nosesandcat-whiskersoftheInternetofThings.Yetthesesensorsareconnectedbyanetworkthatcanbesubvertedbyhostileparties,usingIdentity-Basedriskingthattheiroutputcouldbedivertedorfalseinformationinserted.Giventhevastnumberofsensorstobedeployed,crypt
3、ographicidentitysystemsmaybetheonlySECURITYFORWIRELESSSENSORNETWORKSmanageableapproachtotrustingoursenses.Cryptography—DeanWillis,Chair,IETFSIPWorkingGroup,1999–2009USINGIDENTITY-BASEDCRYPTOGRAPHY…avaluablereferenceonIBCtheoryandpracticethatresearchersandpractitionerswillwantontheirbookshelvesfor
4、manyyears.Inaddition,itwillcertainlystimulatenewdirectionsinresearchinwirelessnetworksecurity.—ThomasM.Chen,Editor-in-Chief,IEEENetwork,2009–2011SecurityforWirelessSensorNetworksusingIdentity-BasedCryptographyintroducesidentity-basedcryptographicschemesforwirelesssensornetworks.Itstartswithanexha
5、ustivesurveyoftheexistinglayeredapproachtoWSNsecurity—detailingitsprosandcons.Next,itexaminesnewattackvectorsthatexploitthelayeredapproachtosecurity.Afterprovidingthenecessarybackground,thebookpresentsacross-layerdesignapproachthataddressesauthentication,integrity,andencryption.ItalsoexaminesnewI
6、D-basedkeymanagementmechanismsusingacross-layerdesignperspective.Inaddition,secureroutingalgorithmsusingID-basedcryptographyarealsodiscussed.Supplyingreaderswiththerequiredfoundationinellipticcurvecryptographyandidentity-basedcryptography,theauthorsconsidernewID-basedsecuritysolutionstoovercomecr
7、osslayerattacksinWSN.ExaminingthelatestimplementationsofID-basedcryptographyonsensors,thebookcombinescross-layerdesignprinciplesalongwithidentity-basedcryptographytoprovideyouwithanewsetofsecuritysolutionsthatcanboosts