Cryptography Reference
In-Depth Information
Chapter 5
Identity-Based
Authentication and
Encryption in Wireless
Sensor Networks
In This Chapter
• Introduction to authentication in WSN
• Review of authentication schemes in WSN
• Identity-based authentication in WSN
• Identity-based encryption in WSN
• One-pass authenticated session key establishment in WSN
• Revocation in WSN
5.1 Introduction
Wireless Sensor Networks (WSN) consist of a large number of low-cost, low-powered
sensor nodes that facilitate data collection in many diverse applications. They offer
unprecedented opportunities for a broad range of monitoring and tracking applica-
tions in both civilian and military sectors (Chapter 1). In addition, the data aggregated
from the sensor nodes are accessed from nodes within the network as well as external
users. In all these applications, authentication and further encryption are fundamental
93
 
Search WWH ::




Custom Search