Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks
The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term tru...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 317 |
---|---|
container_issue | |
container_start_page | 313 |
container_title | |
container_volume | |
creator | Yussoff, Yusnani Mohd Hashim, H. Baba, M. D. |
description | The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper. |
doi_str_mv | 10.1109/ICSGRC.2012.6287183 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6287183</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6287183</ieee_id><sourcerecordid>6287183</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-9d75f9aab0aba0fd51e1ec02d386c3a03aa40fa4b4ecd9d55e0a7fa1e49a83743</originalsourceid><addsrcrecordid>eNpFkE1LxDAURSMiqOP8gtlkqYvWpEm_lmOZGQuDgjOgu_LavEC0NiWJSP-9RQe8m8uBw11cQlacxZyz8r6uDruXKk4YT-IsKXJeiDNyzWWWi4QJ-Xb-D2lxSZbev7M5ecE5F1ekWQ_QT954ajUN7ssHVNQoHIIJE23Bz4hD56YxGDvQ2_phE_1qd3R0NtjO9lRbR1-Nwx69pwcc_MxPGL6t-_A35EJD73F56gU5bjfH6jHaP-_qar2PTMlCVKo81SVAy6AFplXKkWPHEiWKrBPABIBkGmQrsVOlSlNkkGvgKEsoRC7Fgqz-Zg0iNqMzn-Cm5vSH-AFFH1cS</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yussoff, Yusnani Mohd ; Hashim, H. ; Baba, M. D.</creator><creatorcontrib>Yussoff, Yusnani Mohd ; Hashim, H. ; Baba, M. D.</creatorcontrib><description>The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.</description><identifier>ISBN: 1467320358</identifier><identifier>ISBN: 9781467320351</identifier><identifier>EISBN: 146732034X</identifier><identifier>EISBN: 9781467320368</identifier><identifier>EISBN: 9781467320344</identifier><identifier>EISBN: 1467320366</identifier><identifier>DOI: 10.1109/ICSGRC.2012.6287183</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Base stations ; Formal Analysis ; Protocols ; Public key ; Security ; Trusted Computing ; Wireless sensor networks ; WSN</subject><ispartof>2012 IEEE Control and System Graduate Research Colloquium, 2012, p.313-317</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6287183$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6287183$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yussoff, Yusnani Mohd</creatorcontrib><creatorcontrib>Hashim, H.</creatorcontrib><creatorcontrib>Baba, M. D.</creatorcontrib><title>Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks</title><title>2012 IEEE Control and System Graduate Research Colloquium</title><addtitle>ICSGRC</addtitle><description>The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.</description><subject>Authentication</subject><subject>Base stations</subject><subject>Formal Analysis</subject><subject>Protocols</subject><subject>Public key</subject><subject>Security</subject><subject>Trusted Computing</subject><subject>Wireless sensor networks</subject><subject>WSN</subject><isbn>1467320358</isbn><isbn>9781467320351</isbn><isbn>146732034X</isbn><isbn>9781467320368</isbn><isbn>9781467320344</isbn><isbn>1467320366</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkE1LxDAURSMiqOP8gtlkqYvWpEm_lmOZGQuDgjOgu_LavEC0NiWJSP-9RQe8m8uBw11cQlacxZyz8r6uDruXKk4YT-IsKXJeiDNyzWWWi4QJ-Xb-D2lxSZbev7M5ecE5F1ekWQ_QT954ajUN7ssHVNQoHIIJE23Bz4hD56YxGDvQ2_phE_1qd3R0NtjO9lRbR1-Nwx69pwcc_MxPGL6t-_A35EJD73F56gU5bjfH6jHaP-_qar2PTMlCVKo81SVAy6AFplXKkWPHEiWKrBPABIBkGmQrsVOlSlNkkGvgKEsoRC7Fgqz-Zg0iNqMzn-Cm5vSH-AFFH1cS</recordid><startdate>201207</startdate><enddate>201207</enddate><creator>Yussoff, Yusnani Mohd</creator><creator>Hashim, H.</creator><creator>Baba, M. D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201207</creationdate><title>Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks</title><author>Yussoff, Yusnani Mohd ; Hashim, H. ; Baba, M. D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-9d75f9aab0aba0fd51e1ec02d386c3a03aa40fa4b4ecd9d55e0a7fa1e49a83743</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Authentication</topic><topic>Base stations</topic><topic>Formal Analysis</topic><topic>Protocols</topic><topic>Public key</topic><topic>Security</topic><topic>Trusted Computing</topic><topic>Wireless sensor networks</topic><topic>WSN</topic><toplevel>online_resources</toplevel><creatorcontrib>Yussoff, Yusnani Mohd</creatorcontrib><creatorcontrib>Hashim, H.</creatorcontrib><creatorcontrib>Baba, M. D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEL</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yussoff, Yusnani Mohd</au><au>Hashim, H.</au><au>Baba, M. D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks</atitle><btitle>2012 IEEE Control and System Graduate Research Colloquium</btitle><stitle>ICSGRC</stitle><date>2012-07</date><risdate>2012</risdate><spage>313</spage><epage>317</epage><pages>313-317</pages><isbn>1467320358</isbn><isbn>9781467320351</isbn><eisbn>146732034X</eisbn><eisbn>9781467320368</eisbn><eisbn>9781467320344</eisbn><eisbn>1467320366</eisbn><abstract>The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discusses the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity-based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.</abstract><pub>IEEE</pub><doi>10.1109/ICSGRC.2012.6287183</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467320358 |
ispartof | 2012 IEEE Control and System Graduate Research Colloquium, 2012, p.313-317 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6287183 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Base stations Formal Analysis Protocols Public key Security Trusted Computing Wireless sensor networks WSN |
title | Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T09%3A07%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysis%20of%20trusted%20identity%20based%20encryption%20(IBE-trust)%20protocol%20for%20Wireless%20Sensor%20Networks&rft.btitle=2012%20IEEE%20Control%20and%20System%20Graduate%20Research%20Colloquium&rft.au=Yussoff,%20Yusnani%20Mohd&rft.date=2012-07&rft.spage=313&rft.epage=317&rft.pages=313-317&rft.isbn=1467320358&rft.isbn_list=9781467320351&rft_id=info:doi/10.1109/ICSGRC.2012.6287183&rft_dat=%3Cieee_6IE%3E6287183%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=146732034X&rft.eisbn_list=9781467320368&rft.eisbn_list=9781467320344&rft.eisbn_list=1467320366&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6287183&rfr_iscdi=true |