OTHER TITLES FROM AUERBACH PUBLICATIONS AND CRC PRESS
The 7 Qualities of Highly Secure Software
Mano Paul
ISBN 978-1-4398-1446-8
Communication and Networking in Smart Grids
Edited by Yang Xiao
ISBN 978-1-4398-7873-6
Developing Essbase Applications: Advanced Techniques for Finance and IT Professionals
Cameron Lackpour
ISBN 978-1-4665-5330-9
Drupal Web Profiles
Timi Ogunjobi
ISBN 978-1-4665-0381-6
Effective Methods for Software and Systems Integration
Boyd L. Summers
ISBN 978-1-4398-7662-6
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval
David R. Matthews
ISBN 978-1-4398-7726-5
Enterprise 2.0: Social Networking Tools to Transform Your Organization
Jessica Keyes
ISBN 978-1-4398-8043-2
Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios
Josephina Antoniou and Andreas Pitsillides
ISBN 978-1-4398-4808-1
Green Mobile Devices and Networks: Energy Optimization and ScavengingTechniques
Hrishikesh Venkataraman and Gabriel-Miro Muntean
ISBN 978-1-4398-5989-6
Handbook of Mobile Systems Applications and Services
Anup Kumar and Bin Xie
ISBN 978-1-4398-0152-9
The IFPUG Guide to IT and Software Measurement
Edited by IFPUG
ISBN 978-1-4398-6930-7
Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)
Jesus Mena
ISBN 978-1-4398-8191-0
Media Networks: Architectures, Applications, and Standards
Edited by Hassnaa Moustafa and Sherali Zeadally
ISBN 978-1-4398-7728-9
Multimedia Communications and Networking
Mario Marques da Silva
ISBN 978-1-4398-7484-4
The New Triple Constraints for Sustainable Projects, Programs, and Portfolios
Gregory T. Haugan
ISBN 978-1-4665-0518-6
Noiseless Steganography: The Key to Covert Communications
Abdelrahman Desoky
ISBN 978-1-4398-4621-6
Open Source Data Warehousing and Business Intelligence
Lakshman Bulusu
ISBN 978-1-4398-1640-0
Physical Principles of Wireless Communications, Second Edition
Victor L. Granatstein
ISBN 978-1-4398-7897-2
Software Engineering Design: Theory and Practice
Carlos E. Otero
ISBN 978-1-4398-5168-5
Strategy and Business Process Management: Techniques for Improving Execution, Adaptability, and Consistency
Carl F. Lehmann
ISBN 978-1-4398-9023-3
Theory and Approaches of Unascertained Group Decision-Making
Jianjun Zhu
ISBN 978-1-4200-8750-5
TV Content Analysis: Techniques and Applications
Yiannis Kompatsiaris, Bernard Merialdo, and Shiguo Lian
ISBN 978-1-4398-5560-7
Comments from Accomplished People in the Field on
Security for Wireless Sensor Networks using
Identity-Based Cryptography
Security for Wireless Sensor Networks using Identity-Based Cryptography provides a step-by-step approach to everything youll need to know about wireless sensor network security. The book also has information about many topics relevant to wireless sensor network security planning, design, and implementation of Identity-Based Cryptography, which is a superior security solution with better resistance against known attacks.
John R. Vacca
Author, Professional Writer, Editor, Reviewer and IT Consultant
Getting the right balance of systems security is a hard enough task in traditional networking, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks.
Vijay K. Gurbani, Ph.D.
Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent
Adjunct Professor, Department of Computer Science, Illinois Institute of Technology
Strong identity mechanisms are a hard sell for todays Net because people feel that they know who theyre talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace feeling secure with actually being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses.
Dean Willis
Chair, IETF SIP Working Group, 19992009
Security for Wireless
Sensor Networks
using Identity-Based
Cryptography
Harsh Kupwade Patil
Stephen A. Szygenda
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
2013 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Version Date: 20121009
International Standard Book Number-13: 978-1-4665-8126-5 (eBook - ePub)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com