Sensor network security through identity-based encryption

Nigel Boston
University of South Carolina

The cryptographic technique
of choice for low-power systems has been to use elliptic curve methods (public key) for key agreement, followed by secret key methods selected for moderate resource consumption (AES, say).
This ameliorates the key distribution problem, but replaces it with the authentication problem: how does a node verify with whom it is communicating? Recently, identity-based encryption, which reduces the expensive reliance on certificates, has come to the fore as a promising technique for this purpose. We investigate its application to wireless communication and sensor networks.

Audio (MP3 File, Podcast Ready) Presentation (PowerPoint File)

Back to Mathematical Challenges and Opportunities in Sensor Networking